Which of the following is an application that appears to be benign but actually performs a malicious activity?
A) Virus
B) Spyware
C) Trojan horse
D) Worm
C) Trojan horse
Computer Science & Information Technology
You might also like to view...
Which of the following retains information that has been entered through input devices?
a) central processing unit b) memory unit c) arithmetic and logic unit d) output unit
Computer Science & Information Technology
In an unordered list, the default bullet character is a(n) ____, but you can use the CSSlist-style-typeproperty to specify a different bullet shape.
A. dash B. solid circle C. open circle D. asterisk
Computer Science & Information Technology