A software program that responds to commands sent by a command-and-control program located on an external computer is called a

a. bot.
b. spoof.
c. vampire.
d. virus.
e. worm.


A

Computer Science & Information Technology

You might also like to view...

Match each item with a statement below.

A. A connectionless protocol that uses IP to get packets from one computer to another. B. A connectionless protocol used for sending and receiving requests between the client and server on a network. C. A protocol used to generate IP error messages. D. A protocol used to send e-mail in user-level client applications. E. A virtual terminal protocol for connecting to a remote computer. F. A protocol used to map a fully qualified domain name with an IP address. G. A connection-oriented protocol responsible for keeping track of packets and reassembling them into a single file after they have all arrived. H. A protocol used to move files from one computer to another efficiently and accurately. I. A protocol that handles the delivery of data as packets.

Computer Science & Information Technology

Users can format a calculated field by changing the format in the ________ for the new calculated field

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is used to verify the identity of the sender of a signed email?

A. Public key B. Sender's IP C. From field D. Private key

Computer Science & Information Technology

__________ is used to encode real numbers to store them in the computer's memory.

a. Floating-point notation b. Unicode c. Assembly language d. RAM

Computer Science & Information Technology