Which of the following is an application that appears to be benign but actually performs a malicious activity?
a. Virus
b. Spyware
c. Trojan
d. Worm
ANS: C
Computer Science & Information Technology
You might also like to view...
9) How many bytes are contained within 16-bits, 32-bits, 64-bits?
What will be an ideal response?
Computer Science & Information Technology
Opening a table in Datasheet View enables:
A) entering a description of a field. B) choosing the data type of each field. C) entering data into a field. D) adding and editing fields.
Computer Science & Information Technology
Pocket PCs and small music players are often referred to as ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
The use of ________ may force agencies to update software licenses or lose company support
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology