A computer program designed to "infect" a program file that may create annoying screen messages to wipe out an entire hard drive is a:
a. Worm
b. Virus
c. Trojan Horse
d. Logic Bomb
B
You might also like to view...
__________ is a technique of futures research that assesses the risks and opportunities that face those who plan for the future
Fill in the blank(s) with the appropriate word(s).
The phenomenon of "splitting" as related to terrorism, denotes
A. Separation of the "justness" of the cause from the methods employed. B. The distinction between anarchist/ideologue and separatist/nationalist terrorism. C. Projecting one's own negative traits unto others. D. Differentiating psychological root-causes of terrorism from sociological ones.
What is an oxidizing agent? Why is an oxidizing agent important to an explosion?
What will be an ideal response?
The CompStat program in Minneapolis is referred to as:
A) The Twin City Model B) COPS. C) CODEFOR. D) SARA.