A software program that responds to commands sent by a command-and-control program located on an external computer is called a
a. bot.
b. spoof.
c. vampire.
d. virus.
e. worm.
A
You might also like to view...
Match each item with a statement below.
A. A connectionless protocol that uses IP to get packets from one computer to another. B. A connectionless protocol used for sending and receiving requests between the client and server on a network. C. A protocol used to generate IP error messages. D. A protocol used to send e-mail in user-level client applications. E. A virtual terminal protocol for connecting to a remote computer. F. A protocol used to map a fully qualified domain name with an IP address. G. A connection-oriented protocol responsible for keeping track of packets and reassembling them into a single file after they have all arrived. H. A protocol used to move files from one computer to another efficiently and accurately. I. A protocol that handles the delivery of data as packets.
Users can format a calculated field by changing the format in the ________ for the new calculated field
Fill in the blank(s) with correct word
Which of the following is used to verify the identity of the sender of a signed email?
A. Public key B. Sender's IP C. From field D. Private key
__________ is used to encode real numbers to store them in the computer's memory.
a. Floating-point notation b. Unicode c. Assembly language d. RAM