A piece of self-replicating code embedded within another program is called a

a. hack.
b. rogue.
c. Trojan horse.
d. virus.
e. worm.


D

Computer Science & Information Technology

You might also like to view...

MC The control value of a for structure that iterates a sequence represents the______of each element.

a) value. b) subscript. c) location in memory. d) None of the above.

Computer Science & Information Technology

When handouts exported from PowerPoint to Word are saved in Word, the extension on the Word file will be ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

An application needs to calculate a discount for customers who are either preferred customers or senior citizens. Preferred customers have a discount code of "P". Senior citizens have a discount code of "S". The discount code is stored in the strCode variable. Write an If clause to calculate a discount for all preferred members and senior citizens using the strCode variable.

What will be an ideal response?

Computer Science & Information Technology

A major disadvantage of ________ is susceptibility to noise and interference.

a. Bluetooth b. microwaves c. radio transmission d. WiFi

Computer Science & Information Technology