____ disguise themselves as useful programs or apps but do damage when you run them;
A. Trojan horses
B. Rootkits
C. All of the above
D. None of the above
Answer: C
Computer Science & Information Technology
You might also like to view...
Sub procedures are used to store VBA procedures that can be referenced or called by other procedures or events in the database
Indicate whether the statement is true or false
Computer Science & Information Technology
According to the order of operations, expressions in ________ are calculated first
Fill in the blank(s) with correct word
Computer Science & Information Technology