A computer ____ is a program that secretly attaches itself to another document or program and executes when that document or program is opened.
A. virus
B. worm
C. spam
D. logic bomb
Answer: A
You might also like to view...
Do the following two statements in (I) and (II) result in the same value in sum?
``` (I): for (int i = 0; i < 10; ++i) { sum += i; } (II): for (int i = 0; i < 10; i++) { sum += i; } ``` a. Yes b. No
Click any pixel on the canvas and the Magic Wand tool selects other pixels based on ____.
A. tolerance B. similarity C. proximity D. fording
Which is a protocol that encrypts data before it is sent across the Internet?
a. SMM b. SMS c. SSL
?In the rapid application development (RAD) model in the accompanying figure, during the _____ phase, users interact with systems analysts and develop models and prototypes that represent all system processes, outputs, and inputs.
A. ?requirements planning B. ?user design C. ?construction D. ?cutover