A ____ is typically "caught" from programs and files downloaded from the Internet, electronic mail attachments, or shareware disks containing free or inexpensive software or illegally obtained pirated software.

A. worm
B. virus
C. Trojan horse
D. botnet


Answer: B

Computer Science & Information Technology

You might also like to view...

Which statement is false?

a. SortedSet extends Set. b. Class SortedSet implements TreeSet. c. When a HashSet is constructed, it removes any duplicates in the Collection. d. By definition, a Set object does not contain any duplicates.

Computer Science & Information Technology

Consider a pair of processes X and Y that use the communication service B from Exercise 2.14 to communicate with one another. Suppose that X is a client and Y a server and that an invocation consists of a request message from X to Y (that carries out the request) followed by a reply message from Y to X. Describe the classes of failure that may be exhibited by an invocation.

What will be an ideal response?

Computer Science & Information Technology

Match the following terms to their meanings:

I. Bound Report II. Unbound report III. Main report IV. Subreport A. a report that is embedded within another report B. a report that does not display data from an underlying source C. a report that displays data from an underlying table, query, or SQL statement D. a report that contains a subreport

Computer Science & Information Technology

Reports have a ________ feature allowing records to be presented in sets

A) relationship B) summation C) formula D) grouping

Computer Science & Information Technology