__________________ are spread by several methods, including running executable code, sharing disks or memory sticks, opening e-mail attachments, and viewing infected or malicious Web pages.

Fill in the blank(s) with the appropriate word(s).

Viruses

Computer Science & Information Technology

You might also like to view...

The ________ command removes the selected text or object and stores it in the Clipboard

A) paste special B) copy C) paste D) cut

Computer Science & Information Technology

What are some examples of Software as a Service (SaaS)?

What will be an ideal response?

Computer Science & Information Technology