A ____ is a small, potentially damaging program or app that can infect a computer or device.

A. client
B. server
C. virus
D. host


Answer: C

Computer Science & Information Technology

You might also like to view...

List all possible schedules for transactions T 1 and T 2 from figure 21.2, and determine which are conflict serializable (correct) and which are not.

What will be an ideal response?

Computer Science & Information Technology

All of the following are illegal characters in a file name EXCEPT ________

A) ? B) _ C) / D) |

Computer Science & Information Technology

Hardware keyloggers provide screen-capture features, which users can utilize to view screenshot images of victim activity

Indicate whether the statement is true or false.

Computer Science & Information Technology

EXX Case 2-1Jaquelyn is creating a literary magazine for her high school.  She is creating a template in Excel to estimate costs for the magazine's sponsors.  There are several error values in the worksheet.  Before she begins using the template, Jaquelyn needs to check for errors and troubleshoot the formulas. Jaquelyn wants to use a SUMIFS function in one of the worksheets. She will type _____ before typing a conditional function and arguments.

A. # B. = C. {} D. "<"

Computer Science & Information Technology