Viruses that do not become active until predetermined specific conditions are met are known as ____ bombs.
A. spyware
B. logic
C. worm
D. Trojan
Answer: B
Computer Science & Information Technology
You might also like to view...
The term ________ refers how data are placed in cells
A) positioning B) alignment C) configuration D) arrangement
Computer Science & Information Technology
The meeting request window includes the To text box, where you enter e-mail addresses for ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology