Which of the following classifications of viruses can change its own code to avoid detection?
A. Stealth
B. Multipartite
C. Polymorphic
D. Worm
Answer: C
You might also like to view...
A peripheral device is linked to a computer through a(n) __________.
a. interface b. connection c. switch d. connector
Which term refers to the process of turning anything you can store in a PHP variable into a byte stream?
a. AJAX b. array c. concatenation d. serialization
There is no difference between batch processing an action and using the Image Processor dialog box.
Answer the following statement true (T) or false (F)
Consider the following struct definition: struct rectangleData{ double length; double width; double area; double perimeter; };Which of the following variable declarations is correct?
A. rectangle rectangleData; B. struct rectangleData(); C. rectangleData myRectangle; D. rectangleData rectangle = new rectangleData();