If your computer has a ________, someone else can gain access to it undetected.

A) zombie
B) logic bomb
C) rootkit
D) botnet


Answer: C) rootkit

Computer Science & Information Technology

You might also like to view...

What happens at line 2?

``` 1 string s = “math is fun!”; 2 int f = s.at(0) 3 int t = s.size(); 4 int n = s.at(5); 5 int y = s.at(s.5); ``` A. The value of f is m. B. The value of f is [] (empty set). C. The program will not compile. D. The program crashes when it runs.

Computer Science & Information Technology

A common protocol that enables users to transfer files between computers is ________

A) IP B) Telnet C) TCP D) FTP

Computer Science & Information Technology

A(n) ____________________ program exchanges information with a designated e-mail server to send and receive messages.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Calculates the number of periods for an investment or loan given a fixed rate, period payment, and present value.

What will be an ideal response?

Computer Science & Information Technology