Gwen has discovered a program that has copied itself throughout the network. The program does not appear to have a host program and is overloading the network as it replicates. It has even installed a web server on the network and is allowing other computers to connect.
 
What type of malware has Gwen discovered?

A. Worm
B. Trojan
C. Spyware
D. Rootkit


Answer: A

Computer Science & Information Technology

You might also like to view...

The technique of implementing each stack method as a call to a List method is called __________.

a. delegation. b. delimiting. c. assigning. d. shifting responsibility.

Computer Science & Information Technology

Consider a 2-by-3 integer array t.

a) Write a declaration for t. b) How many rows does t have? c) How many columns does t have? d) How many elements does t have? e) Write the names of all the elements in row 1 of t. f) Write the names of all the elements in column 2 of t. g) Write a statement that sets the element of t in the first row and second column to zero. h) Write a series of statements that initialize each element of t to zero. Do not use a loop. i) Write a nested counter-controlled for statement that initializes each element of t to zero. j) Write a nested range-based for statement that initializes each element of t to zero.

Computer Science & Information Technology

Indentation in a document is established at the ________ level

A) word B) paragraph C) page D) sentence

Computer Science & Information Technology

When you make changes to the ________ style, many other styles are also changed

Fill in the blank(s) with correct word

Computer Science & Information Technology