COGNITIVE ASSESSMENT
What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?

A. malware
B. cybersoft
C. evilapp
D. viralware


Answer: A

Computer Science & Information Technology

You might also like to view...

How do methods setIn, setOut and setErr affect the standard input, output and error streams?

a. They output data to the standard input, output and error streams. b. They provide the only way to access the standard input, output and error streams. c. They redirect the standard input, output and error streams. d. They empty the standard input, output and error streams.

Computer Science & Information Technology

A __________ is an individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection.

A) misfeasor B) clandestine user C) superuser D) masquerader

Computer Science & Information Technology

Users can connect to Facebook over the Internet, via Internet Explorer or some other web browser, or from a smartphone or other mobile device

Indicate whether the statement is true or false

Computer Science & Information Technology

Complex code is better for the development team.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology