When a program can infect other programs by modifying them or inserting itself into the commands of legitimate programs to wreak havoc, we refer to this process as a:

a. virus
b. thread
c. hard-wire
d. scoop


A

Criminal Justice

You might also like to view...

Of our five intelligences, our "intellect" is the most important for career success

Indicate whether the statement is true or false

Criminal Justice

All of the following are examples of ethical challenges that researchers face EXCEPT ______.

a. receiving informed consent b. maintaining anonymity c. maintaining confidentiality d. choosing a proper methodology

Criminal Justice

The domestic terror bombing in Oklahoma City occurred in:

a. 2001.
b. 2010.
c. 1995.
d. 1878.

Criminal Justice

The school of criminology that considers criminal behavior to be the predictable result of a person's interaction with his or her environment is called __________

a. strain theory b. social disorganization theory c. social process theory d. the Chicago School

Criminal Justice