A __________ infects files with macro or scripting code that is interpreted by an application.

A. boot sector infector
B. file infector
C. macro virus
D. multipartite virus


C. macro virus

Computer Science & Information Technology

You might also like to view...

Key performance indicators are a(n) ____ means of evaluating both success and risk.

A. independent B. biased C. controlled D. objective

Computer Science & Information Technology

The program-execution stack is also referred to as the ________ stack.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can disable the Code Navigator by selecting the ____________ check box in the Code Navigator.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The level of management concerned with making decisions using predetermined rules which have predictable outcomes is the operations manager. 2. Subcultures coexist with "official" organizational cultures. 3. A brick-and-mortar location uses computer networks and communications technology to bring people together to work on projects. 4. An enterprise resource planning system describes an integrated organizational information system. 5. A use case diagram contains two symbols, the use case and the actor.

Computer Science & Information Technology