A computer program that can infect a computer without the knowledge or permission of the user is a(n)____.

A. Worm
B. Macro Virus
C. Logic bomb
D. Virus

Answer: D

Computer Science & Information Technology

You might also like to view...

What three steps must be taken when removing a host from a vSAN-enabled cluster?

a. Remove VMkernel port with vSAN traffic checkbox checked. b. Remove the host from vSAN cluster c. Remove disks from diskgroups, remove disk groups d. Place the hosts into maintenance mode with Full Migration option selected.

Computer Science & Information Technology

List all of the examples of consistency that you can find in Figure 5-22.


1. What is contrast?
2 Identify the types of contrast in Figure 5-22.

Computer Science & Information Technology