________ are programs that are installed on your computer without your knowledge, often when you download what appears to be a legitimate program, and can interfere with the functioning of your computer

Fill in the blank(s) with correct word

Trojan horses

Computer Science & Information Technology

You might also like to view...

Procedures are small sections of program code also called modules orĀ subprograms. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What training should programmers who do custom programming have?

A. Programmers need to be trained in secure programming both in general and for their particular language and application. B. Programmers don't need any security training. C. Programmers need to be trained in general networking security . D. Programmers need to be trained in secure programming for their particular language and application only.

Computer Science & Information Technology