A _____ is a set of programs that enables its user to gain administrator level access to a computer or network.
a. virus
b. Trojan horse
c. rootkit
d. worm
Ans: c. rootkit
You might also like to view...
Which file property setting will prevent accidental changes to the original file?
A) compress B) archive C) read-only D) encrypt
Steve is working in a database that holds patient data for a medical center. A patient's identification number serves as a primary key in the Patient table. A patient's identification number serves as a foreign key in the Doctor table. Steve wants to create a Form that displays Doctor table records with foreign key values that match the primary key value in the Patient table. How should Steve
proceed? A) Use the Form tool to create the form and Access will analyze the table relationships Steve created in the database, and automatically add a Split form to his form. B) Use the Form tool to create the form and Access will analyze the table relationships Steve created in the database, and automatically add a subform to his form. C) Use the Form tool to create the form and Access will analyze the table relationships Steve created in the database, and automatically add a Multi-items form to his form. D) Steve can only create a form that displays one record source at a time.