A ________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

A. worm
B. zombie
C. Trojan horse
D. virus

Answer: D

Computer Science & Information Technology

You might also like to view...

When you set the width of a horizontal rule as a percentage of the page rather than in ____________________, it resizes itself proportionately when viewed on different-sized monitors and resolutions.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

? In the accompanying figure, any field that serves as a primary key is called a _____.?

A. ?candidate key B. ?secondary key C. ?combination key D. ?foreign key

Computer Science & Information Technology