Which of the following statements describes a worm?
a. A program that disguises itself as something useful but actually harms your system.
b. A process that runs automatically, without requiring a person to start or stop it.
c. A program that runs independently of other software and travels between computers and across networks.
d. A program that locks a user's data or computer system until a ransom is paid.
ANSWER: c
You might also like to view...
____ risks are not predictable and are not subject to management by standard risk management methods.
A. Known B. Unknown C. Avoidable D. Potential
When a multispeed, auto-sensing 100BaseT NIC connects to a 10BaseT Ethernet hub, at what speed will the NIC function?
A. 10 Mbps sending, 100 Mbps receiving B. 100 Mbps sending, 10 Mbps receiving C. 10 Mbps sending and receiving D. 100 Mbps sending and receiving
Headphones rest inside the ear canal.
Answer the following statement true (T) or false (F)
Which of the following is true of a Webinar?
a. It automatically delivers to subscribers the updated posts from their favorite blogs with limited one-way communication. b. It is a live Internet presentation that supports interactive communications between the presenter and the audience. c. It provides a set of tools to report project status. d. It determines the resource availability and schedule rooms for meetings over the internet.