You should use a(n) ________ program to protect your computer from Trojan horses and worms.

a. adware
b. rootkit
c. antivirus
d. spam


c. antivirus

Computer Science & Information Technology

You might also like to view...

You can combine linear and hierarchical structures in a Web site.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is list after the following code is executed?

``` ArrayList list = new ArrayList<>(); list.add(1); list.add(2); list.add(3); list.add(4); list.add(5); list.remove(2); System.out.println(list);``` a. [1, 2, 3, 4, 5] b. [2, 3, 4, 5] c. [1, 3, 4, 5] d. [1, 2, 4, 5] e. [1, 2, 3, 4]

Computer Science & Information Technology

?Suppose you are the president of the newly formed Business Students Club at your university. As the first step in strategic planning, you will create the _______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Fill in the code to complete the following method for computing factorial.

``` /** Return the factorial for a specified index */ public static long factorial(int n) { if (n == 0) // Base case return 1; else return _____________; // Recursive call } ``` a. n * (n - 1) b. n c. n * factorial(n - 1) d. factorial(n - 1) * n

Computer Science & Information Technology