A ____ combines into one program the characteristics of other attacks.
A. Trojan Horse
B. worm
C. multi-thread virus
D. blended threat
Answer: D
Computer Science & Information Technology
You might also like to view...
________ enables users to define their own data-based tags and facilitates exchange of information between websites
A) XHTML B) PHP C) XML D) HTML
Computer Science & Information Technology
The problem with using the Extend Volume command, when resizing the partition, is that all of your data will be lost
Indicate whether the statement is true or false
Computer Science & Information Technology