Which of the following is malware that pretends to do one thing, or looks as if it's doing one thing, while doing something evil?

A. rootkit
B. macro
C. worm
D. Trojan


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following icons should you click to insert a piece of clip art?

A.
B.
C.
D.

Computer Science & Information Technology

Compare and contrast FDDI to the token ring access method.

What will be an ideal response?

Computer Science & Information Technology

Which of the following common features of Access 2016 is compatible with Access 2003?

A) Fields with the Hyperlink data type B) Data macros C) Calculated fields in tables D) Multivalued lookup fields

Computer Science & Information Technology

_____ content allows an element to contain both parsed character data and child elements.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology