What type of malware is heavily dependent on a user in order to spread?

A. Trojan
B. worm
C. rootkit
D. virus


Answer: D

Computer Science & Information Technology

You might also like to view...

A subclass may call an overridden superclass method by __________.

a. prefixing its name with the super key word and a dot (.) b. prefixing its name with the name of the superclass in parentheses c. using the extends key word before the method is called d. calling the superclass method first and then calling the subclass method

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The overarching goal of human-computer interaction is to achieve efficiency. 2. It is important that the fit among the user, computer, and task all correspond. 3. Better fit results in greater efficiency but many times more stress for the human involved in the system. 4. One important consideration is that data are made available in a single form so that users can make sense of them. 5.

Computer Science & Information Technology

If payments are made at the end of a period, the due argument should be ________ in a Future Value function

Fill in the blank(s) with correct word

Computer Science & Information Technology

The data in an Excel table can only be sorted into ascending order

Indicate whether the statement is true or false

Computer Science & Information Technology