Which of the following statements describes a worm?

a. A program that disguises itself as something useful but actually harms your system.
b. A process that runs automatically, without requiring a person to start or stop it.
c. A program that runs independently of other software and travels between computers and across networks.
d. A program that locks a user's data or computer system until a ransom is paid.


ANSWER: c

Computer Science & Information Technology

You might also like to view...

____ risks are not predictable and are not subject to management by standard risk management methods.

A. Known B. Unknown C. Avoidable D. Potential

Computer Science & Information Technology

When a multispeed, auto-sensing 100BaseT NIC connects to a 10BaseT Ethernet hub, at what speed will the NIC function?

A. 10 Mbps sending, 100 Mbps receiving B. 100 Mbps sending, 10 Mbps receiving C. 10 Mbps sending and receiving D. 100 Mbps sending and receiving

Computer Science & Information Technology

Headphones rest inside the ear canal.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is true of a Webinar?

a. It automatically delivers to subscribers the updated posts from their favorite blogs with limited one-way communication. b. It is a live Internet presentation that supports interactive communications between the presenter and the audience. c. It provides a set of tools to report project status. d. It determines the resource availability and schedule rooms for meetings over the internet.

Computer Science & Information Technology