Which of the following virus types uses the address book in the victim's e-mail system for distribution?

A) E-mail virus
B) Polymorphic
C) Macro
D) Multipartite virus


A

Computer Science & Information Technology

You might also like to view...

What are SSIS packages, how are they stored, and what are their basic building blocks?

What will be an ideal response?

Computer Science & Information Technology

Write an HTML page that contains a text field for a credit card number and a button. When the button is clicked check that the text field has only numeric characters in it and check that the number of characters is 16. If not, use an alert dialog to inform the user.

What will be an ideal response?

Computer Science & Information Technology

Write a simple function template for predicate function isEqualTo that compares its two arguments of the same type with the equality operator (==) and returns true if they are equal and false otherwise. Use this function template in a program that calls isEqualTo only with a variety of fundamental types. Now write a separate version of the program that calls isEqualTo with a user-defined class type, but does not overload the equality operator. What happens when you attempt to run this program? Now overload the equality operator (with the operator function) operator==. Now what happens when you attempt to run this program?

What will be an ideal response?

Computer Science & Information Technology

Discuss at length the measurement of the time and space consumed by an algorithm in order to determine its efficiency.

What will be an ideal response?

Computer Science & Information Technology