____ can attach themselves to a legitimate computer file, replicate to other programs, and deliver various payloads.

A. Snakes
B. Viruses
C. Bacteria
D. Worms


Answer: B

Computer Science & Information Technology

You might also like to view...

A ________ object specifies a component's width and height.

A) Container B) Region C) Frame D) Dimension

Computer Science & Information Technology

The main purpose of a text editor is to create a file that can be used by another program.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Upon opening Access, the right side of the screen displays Objects

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following layers is not part of the TCP/IP protocol stack?

A) Transport B) Application C) Presentation D) Internet

Computer Science & Information Technology