A Trojan horse is a program that hides itself by deleting a system file and taking on the system file's name.
True
False
True
You might also like to view...
Processes at _________ priority levels are guaranteed to be selected to run before any time-sharing process but must defer to real-time processes.
A) ?kernel ? B) ?time-shared ? C) ?real time ? D) ?load sharing
Programming style is important, because ______________.
a. a program may not compile if it has a bad style b. good programming style can make a program run faster c. good programming style makes a program more readable d. good programming style helps reduce programming errors
You would use a ________ in which you can type information anywhere on a slide
A) flow chart B) selection net C) text box D) vertex
?____ is a standard that was developed by the Wi-Fi Alliance to address some of the inherent weaknesses in WEP.
A. ?WEPX B. ?WEP2 C. ?WAP D. ?WPA