________ is a category of programs that are intended to do harm to your computer

A) Malware B) Spyware C) Virus protection D) Adware


A

Computer Science & Information Technology

You might also like to view...

Suppose an oil exploration company wishes to collect, codify,  and store knowledge that is used in the organization, they should use _______.

A. ?a virtual reality system B. ?an expert system C. a transaction processing system D. ?a knowledge management system

Computer Science & Information Technology

What does ADT stand for?

A. abstract definition type B. asynchronous data transfer C. abstract data type D. alternative definition type

Computer Science & Information Technology

Inventory characteristics for hardware and software assets that record the manufacturer and versions are related to technical functionality, and should be highly accurate and updated each time there is a change.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When you add an action to a macro and that action has several arguments, each of the arguments are required.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology