A ____ is typically "caught" from programs and files downloaded from the Internet, electronic mail attachments, or shareware disks containing free or inexpensive software or illegally obtained pirated software.
A. worm
B. virus
C. Trojan horse
D. botnet
Answer: B
You might also like to view...
Which statement is false?
a. SortedSet extends Set. b. Class SortedSet implements TreeSet. c. When a HashSet is constructed, it removes any duplicates in the Collection. d. By definition, a Set object does not contain any duplicates.
Consider a pair of processes X and Y that use the communication service B from Exercise 2.14 to communicate with one another. Suppose that X is a client and Y a server and that an invocation consists of a request message from X to Y (that carries out the request) followed by a reply message from Y to X. Describe the classes of failure that may be exhibited by an invocation.
What will be an ideal response?
Match the following terms to their meanings:
I. Bound Report II. Unbound report III. Main report IV. Subreport A. a report that is embedded within another report B. a report that does not display data from an underlying source C. a report that displays data from an underlying table, query, or SQL statement D. a report that contains a subreport
Reports have a ________ feature allowing records to be presented in sets
A) relationship B) summation C) formula D) grouping