Executable code that attaches itself to software, replicates itself, and spreads to other systems or files. When triggered, it makes unauthorized alterations to the way a system operates, which is called a

A) virus.
B) logic bomb.
C) trap door.
D) data diddle.

Answer: A

Business

You might also like to view...

Which of the following is typically not considered one of the stages of the product life cycle?

a. introduction b. growth c. maturity d. extension

Business

What do DLLs do and why are they associated with a specific process?

What will be an ideal response?

Business