Which of the following Trojans enables the hacker to turn on the webcam and record audio?

a. Sub Seven
b. Poison ivy
c. GhostRat
d. Tini


ANS: C

Computer Science & Information Technology

You might also like to view...

Han, an environmental lawyer, travels around the United States to create awareness and propagate the environmental law. She presents such information in various institutes on PowerPoint slides. Han is asked to address a group of university students on the importance of being aware of environmental laws. After creating the presentation, Han wishes to modify it such that, in the slide show, each shape in the SmartArt appears as random bars that combine together to form the complete shape with contents. In this scenario, Han should click the _____ tab.

A. ?Transitions B. ?Animations C. ?Design D. ?Review

Computer Science & Information Technology

In the following code, which lines make up all of the accessor methods?0 public class Bus {1 private BankAccount ba;2 private double fuelLeft;3 private final double FUEL_MAX = 40.0;4 private final double FUEL_COST = 3.54;5 public Bus(BankAccount baRef) {6 fuelLeft = 0;7 ba = baRef;8 }9 public void fillTank() {10 double cost = (FUEL_MAX - fuelLeft) * FUEL_COST;11 if (ba.pay(cost) == true) {12 fuelLeft = FUEL_MAX;13 }14 }15 public double getFuelLeft() {16 return fuelLeft;17 }18 }

A. Lines 9-14 B. Lines 15-17 C. Lines 9-17 D. Lines 5-8

Computer Science & Information Technology

Click any pixel on the canvas, and the Magic Wand tool selects other pixels based on continuity- the similarity of their color.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ________ is a faded image or text used as a background of a document

A) imprint B) watermark C) alt-text D) draft

Computer Science & Information Technology