1. A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim's data is __________

A. Adobe B. Animoto
C. malware D. Prezi


C

Business

You might also like to view...

Which of the following is an example of the paradox of control in action?

a. maintaining overall control of situations while offering autocracy to followers b. stressing conformity in how work should be done while not allowing any exceptions c. being clear with followers but at the same time micro-managing them d. placing high requirements on followers but also allowing them to make mistakes

Business

The ________ is used to test the statistical significance of the observed association in cross-tabulation

A) contingency coefficient B) Cramer's V C) phi coefficient D) chi-square statistic

Business

When examining ways an individual can enhance their personal attractiveness to a target of influence or a negotiating opponent, ________ combined with persistence leads to assertiveness and determination.

Fill in the blank(s) with the appropriate word(s).

Business

Martin Company purchases a machine at the beginning of the year at a cost of $66,000. The machine is depreciated using the double-declining-balance method. The machine's useful life is estimated to be 4 years with a $5500 salvage value. Depreciation expense in year 4 is:

A. $4125. B. $33,000. C. $2750. D. $5500. E. $15,125.

Business