The virus/worm that attempts to copy itself to C:WINDOWSFVProtect.exe is _______

a. W32/Netsky-P
b. Troj/Invo-Zip
c. MacDefender
d. Sobig


Answer A.

Computer Science & Information Technology

You might also like to view...

Rewrite bundle (page 451) so the script it creates takes an optional list of filenames as arguments. If one or more filenames are given on the command line, only those files should be re-created; otherwise, all files in the shell archive should be re-created. For example, suppose all files with the file- name extension .c are bundled into an archive named srcshell, and you want to unbundle just the files test1.c and test2.c. The following command will unbundle just these two files:

$ bash srcshell test1.c test2.c

Computer Science & Information Technology

The Send Backward command moves an object underneath another object.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Most 64-bit chips require less time to complete tasks than 32-bit CPU chips

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ function determines the smallest value within a selected range of values

Fill in the blank(s) with correct word

Computer Science & Information Technology