Answer the following statements true (T) or false (F)

1. Malicious software aims to trick users into revealing sensitive personal data.
2. Keyware captures keystrokes on a compromised system.
3. Metamorphic code is software that can be shipped unchanged to a
heterogeneous collection of platforms and execute with identical semantics.
4. A virus that attaches to an executable program can do anything that the
program is permitted to do.
5. It is not possible to spread a virus via a USB stick


1. True
2. False
3. False
4. True
5. True

Computer Science & Information Technology

You might also like to view...

Using the Style button, the ____ style sets a height-to-width ratio using decimal values.

a. Fixed Ratio b. Proportional c. Normal d. Refine Edge

Computer Science & Information Technology

The Dock is a glossy ribbon at the bottom of your screen that contains ____________________, or small images that represent programs, folders and files, and the Trash.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Wayne is using the command line and is in his home directory. Which of the following will display a list of all files and their sizes from his home directory? (Choose two.)

A. ls -ax B. ls -al ~ C. ls -ax ~ D. ls -al /home/wayne

Computer Science & Information Technology

You have a PivotTable with 2 fields in the ROWS area and you want to see only the top level of categories. How do you hide the entire second level without removing it from the ROWS area?

A. Click Expand Field in the Active Field Group on the Analyze tab. B. Select a field in the row headers and click Collapse Field in the Active Field Group on the Analyze tab. C. Click the - button to the left of the first category. D. You must move the second level out of the ROWS area.

Computer Science & Information Technology