A self-contained program that spreads through a computer network by exploiting security holes is called a

a. hack.
b. rogue.
c. Trojan horse.
d. virus.
e. worm.


E

Computer Science & Information Technology

You might also like to view...

Given the following declarations, which of the following is legal syntax?

string str="Your name"; char c_string[20]="My name"; a. str = c_string; b. c_string = str; c. strcpy(c_string, str.c_str()); d. strcpy(c_string, str); e. A and C

Computer Science & Information Technology

Which level of management makes decisions using predetermined rules that have predictable outcomes?

A) operations B) middle C) strategic D) None are interested in detailed information.

Computer Science & Information Technology

Which of the following deals with the science of measuring individual body characteristics?

A) antivirus software B) biometrics C) encryption D) hacking E) security

Computer Science & Information Technology

Users cannot print to a network printer. After physically checking the printer everything appears to be functioning correctly on the printer. Which of the following is the MOST likely cause of the problem?

A. The printer is out of memory. B. The printer is disconnected from the network. C. The printer is out of paper. D. The printer is not powered on.

Computer Science & Information Technology