A Trojan horse is a program that hides itself by deleting a system file and taking on the system file's name.

True
False


True

Computer Science & Information Technology

You might also like to view...

Processes at _________ priority levels are guaranteed to be selected to run before any time-sharing process but must defer to real-time processes.

A) ?kernel ? B) ?time-shared ? C) ?real time ? D) ?load sharing

Computer Science & Information Technology

Programming style is important, because ______________.

a. a program may not compile if it has a bad style b. good programming style can make a program run faster c. good programming style makes a program more readable d. good programming style helps reduce programming errors

Computer Science & Information Technology

You would use a ________ in which you can type information anywhere on a slide

A) flow chart B) selection net C) text box D) vertex

Computer Science & Information Technology

?____ is a standard that was developed by the Wi-Fi Alliance to address some of the inherent weaknesses in WEP.

A. ?WEPX B. ?WEP2 C. ?WAP D. ?WPA

Computer Science & Information Technology