Critical Thinking QuestionsCase 1-2John's new computer has started to perform oddly and he is concerned that it may have become infected with malware. He knows that you work for a company that produces antivirus software so he gives you a call to ask for advice. What do you tell him is the difference between a worm and a Trojan horse?

What will be an ideal response?


A worm is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network. A Trojan horse (named after the Greek myth) is a program that hides within or looks like a legitimate program. A certain condition or action usually triggers the Trojan horse. Unlike a virus or worm, a Trojan horse does not replicate itself to other computers.

Computer Science & Information Technology

You might also like to view...

Discrete logarithms are fundamental to the digital signature algorithm (DSA) and the _________ algorithm.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is a database management system?

What will be an ideal response?

Computer Science & Information Technology

The fastest-growing ________ on LinkedIn consists of students and recent college graduates

Fill in the blank(s) with correct word

Computer Science & Information Technology

To generate a report, click the Report button in the Reports group on the ________ tab

A) Design B) Database Tools C) Home D) Create

Computer Science & Information Technology