The term "____" is sometimes used as a general term for malware, but that is not the way it is used by computer professionals.

A. Trojan horse
B. spam
C. virus
D. hacking


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following is a method of testing a movie clip symbol's animation?

a. pressing the ENTER key b. pressing CTRL+ENTER c. dragging the playhead from the main Timeline d. selecting Test Movie from the Control menu of the Application bar

Computer Science & Information Technology

Which of the following statements is false?

a) Before submitting your apps for publication or In-App Products (i.e., virtual goods for in-app purchase), make sure that they comply with Microsoft’s requirements for Windows Phone apps. b) Apps that fail to meet Microsoft’s requirements will be rejected—for example if the app includes illegal content, contains pornography or obscene content, encourages harm or violence to others, prevents the user from disabling location services, sells competing mobile services, contains defamatory or threatening content, infringes on trademarks of others and more. c) Once you publish a Windows Phone 8 app, Microsoft requires exclusive rights—you may not republish your app on app stores for other smartphone platforms. d) Microsoft’s app approval process is similar to Apple’s strict process for iOS apps and different from Google’s Android process where apps are not vetted, but they could be removed after the fact.

Computer Science & Information Technology

To send files through Lync, the first step is to open a(n) ________ session with one of your contacts

Fill in the blank(s) with correct word

Computer Science & Information Technology

Apply the rule of IF Statement

Write an IF statement that assigns the text "No" to the variable answer when the variable age is 65 or greater; otherwise, assign "Yes". Write an equivalent statement using the opposite condition, age < 65.

Computer Science & Information Technology