A __________ infects files with macro or scripting code that is interpreted by an application.
A. boot sector infector
B. file infector
C. macro virus
D. multipartite virus
C. macro virus
You might also like to view...
Key performance indicators are a(n) ____ means of evaluating both success and risk.
A. independent B. biased C. controlled D. objective
The program-execution stack is also referred to as the ________ stack.
Fill in the blank(s) with the appropriate word(s).
You can disable the Code Navigator by selecting the ____________ check box in the Code Navigator.?
Fill in the blank(s) with the appropriate word(s).
Answer the following statements true (T) or false (F)
1. The level of management concerned with making decisions using predetermined rules which have predictable outcomes is the operations manager. 2. Subcultures coexist with "official" organizational cultures. 3. A brick-and-mortar location uses computer networks and communications technology to bring people together to work on projects. 4. An enterprise resource planning system describes an integrated organizational information system. 5. A use case diagram contains two symbols, the use case and the actor.