Which type of worm or virus covertly places illegal destructive instructions in the middle of a legitimate program so that once you run the program, it can go to work?
A) File virus
B) Logic virus
C) Macro virus
D) Multipartite virus
E) None of the above
Ans: E) None of the above
Computer Science & Information Technology
You might also like to view...
To print only a chart, select the chart, click the ________ tab, and click Print
Fill in the blank(s) with correct word
Computer Science & Information Technology
When the user presses Enter in a JPasswordField, the GUI component generates an , which is processed by an object that implements the interface .
a. ActionEvent, ActionListener. b. ActionEvent, ActionEventListener. c. TextEvent, TextListener. d. TextEvent, TextEventListener.
Computer Science & Information Technology