A __________ uses macro or scripting code, typically embedded in a document and triggered when the document is viewed or edited, to run and replicate itself into other such documents

A. boot sector infector B. file infector
C. macro virus D. multipartite virus

C

Business

You might also like to view...

In determining whether an employee's right to privacy has been invaded by an employer, courts:

A. apply a balancing test factoring in the employer's needs and the intrusion on the employee's rights. B. are concerned primarily with the amount of monetary harm to the employee. C. focus primarily on the motives of the employer. D. accept the employer's assertion of a need to know at face value.

Business

Due to the intangible nature of services and the need for standardization of image, business format franchising is more appropriate for service sponsor-retailer arrangements than product/trademark franchising

Indicate whether the statement is true or false

Business