Viruses that do not become active until predetermined specific conditions are met are known as ____ bombs.

A. spyware
B. logic
C. worm
D. Trojan

Answer: B

Computer Science & Information Technology

You might also like to view...

The term ________ refers how data are placed in cells

A) positioning B) alignment C) configuration D) arrangement

Computer Science & Information Technology

The meeting request window includes the To text box, where you enter e-mail addresses for ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology