Which type of worm or virus covertly places illegal destructive instructions in the middle of a legitimate program so that once you run the program, it can go to work?

A) File virus
B) Logic virus
C) Macro virus
D) Multipartite virus
E) None of the above

Ans: E) None of the above

Computer Science & Information Technology

You might also like to view...

To print only a chart, select the chart, click the ________ tab, and click Print

Fill in the blank(s) with correct word

Computer Science & Information Technology

When the user presses Enter in a JPasswordField, the GUI component generates an , which is processed by an object that implements the interface .

a. ActionEvent, ActionListener. b. ActionEvent, ActionEventListener. c. TextEvent, TextListener. d. TextEvent, TextEventListener.

Computer Science & Information Technology