Which of the following is malware that pretends to do one thing, or looks as if it's doing one thing, while doing something evil?
A. rootkit
B. macro
C. worm
D. Trojan
Answer: D
Computer Science & Information Technology
You might also like to view...
Which of the following icons should you click to insert a piece of clip art?
A.
B.
C.
D.
Computer Science & Information Technology
Compare and contrast FDDI to the token ring access method.
What will be an ideal response?
Computer Science & Information Technology
Which of the following common features of Access 2016 is compatible with Access 2003?
A) Fields with the Hyperlink data type B) Data macros C) Calculated fields in tables D) Multivalued lookup fields
Computer Science & Information Technology
_____ content allows an element to contain both parsed character data and child elements.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology