____ disguise themselves as useful programs or apps but do damage when you run them;

A. Trojan horses
B. Rootkits
C. All of the above
D. None of the above

Answer: C

Computer Science & Information Technology

You might also like to view...

Sub procedures are used to store VBA procedures that can be referenced or called by other procedures or events in the database

Indicate whether the statement is true or false

Computer Science & Information Technology

According to the order of operations, expressions in ________ are calculated first

Fill in the blank(s) with correct word

Computer Science & Information Technology