A Trojan horse might allow a hacker to _____.
A. see the contents of your screen
B. capture your login keystrokes
C. control your Webcam
D. all of the above
Answer: D
Computer Science & Information Technology
You might also like to view...
Outlook uses the Import and Export Wizard to guide you through the process of saving an entire folder.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Clumsy programming involves code that repeats throughout a program, long modules without any apparent organization, and use of the infamous GOTO statement.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology