A _____ is malicious software designed to spread from computer to computer over local area networks and the Internet.

A. computer worm
B. virus
C. Trojan horse
D. none of the above


Answer: A

Computer Science & Information Technology

You might also like to view...

Fill in the blanks for the HTML code to create a table as shown.


```





< ______ >



< ______ >
< ______ >
```

Computer Science & Information Technology

You are required to create a conceptual data model of the data requirements for a company that specializes in IT training. The Company has 30 instructors and can handle up to 100 trainees per training session. The Company offers five advanced technology courses, each of which is taught by a teaching team of two or more instructors. Each instructor is assigned to a maximum of two teaching teams or may be assigned to do research. Each trainee undertakes one advanced technology course per training session.

(a) Identify the main entity types for the company. (b) Identify the main relationship types and specify the multiplicity for each relationship. State any assumptions you make about the data. (c) Using your answers for (a) and (b), draw a single ER diagram to represent the data requirements for the company.

Computer Science & Information Technology

The cell being copied is called the source area (or copy area). The range of cells receiving the copy is called the ____.

A. receiver cell B. final cell C. receiving range D. destination area (or paste area)

Computer Science & Information Technology

One way to ensure that a variable is of the correct data type is through type ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology
______ ______
______ ______