____ is a general term used to describe software that violates a user's personal security.

A. Virus
B. Spyware
C. Worm
D. Logic bomb


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. In the UML, each class is modeled in a class diagram as a rectangle with three compartments. The top one contains the class’s name centered horizontally in boldface. The middle one contains the class’s attributes, which correspond to instance variables in Java. The bottom one contains the class’s operations, which correspond to methods and constructors in Java. b. UML represents instance variables as an attribute name, followed by a colon and the type. c. Private attributes are preceded by the keyword private in the UML. d. The UML models operations by listing the operation name followed by a set of parentheses. A plus sign (+) in front of the operation name indicates that the operation is a public.

Computer Science & Information Technology

What is the right code for String remove() operation? Such an operation removes and returns an element from the queue.

A queue based on a linked list uses the following code ``` class Node { String element; Node next; Node (String el, Node n) { element = el; next = n; } } Node front = null, rear = null; ``` A) ``` if (rear== null) throw new RuntimeException("Empty"); String temp = rear.element; rear = rear.next; if (front == null) rear = null; return temp; B) ``` if (front == rear) throw new RuntimeException("Empty"); String temp = front.element; front = front.next; if (front == null) rear = null; return temp; C) ``` if (front == null) throw new RuntimeException("Empty"); String temp = front.element; front = front.next; if (front == null) front = rear; return temp; ``` D) ``` if (front == null) throw new RuntimeException("Empty"); String temp = front.element; front = front.next; if (front == null) rear = null; return temp; ```

Computer Science & Information Technology

What type of grid would you normally use for term papers?

A) One-column B) Two-column C) Right-column D) Left-column

Computer Science & Information Technology

A list of documents included along with a letter is known as a list of ________

Fill in the blank(s) with correct word

Computer Science & Information Technology