A ____ is software that has been written to enter a computer system and corrupt the files on the hard drive.

A. computer virus
B. Trojan
C. worm
D. rootkit


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. All exceptions must derive from the class Throwable. b. The class Throwable provides the method getStackTrace that outputs the stack trace to the standard error stream. c. The class Throwable provides the method getMessage that returns the descriptive string stored in an exception. d. The string returned from class Throwable’s getMessage method contains the name of the exception’s class.

Computer Science & Information Technology

As part of the setup process for local email, you must have local ____ software.

A. e-mail client B. e-mail system C. e-mail D. POP mail

Computer Science & Information Technology

What are some other fields or areas that are combined with security technology when providing a security solution?

What will be an ideal response?

Computer Science & Information Technology

Which of the terms below does not have a meaning similar to the other three?

a) process b) model c) class d) abstraction

Computer Science & Information Technology