__________________ are spread by several methods, including running executable code, sharing disks or memory sticks, opening e-mail attachments, and viewing infected or malicious Web pages.
Fill in the blank(s) with the appropriate word(s).
Viruses
Computer Science & Information Technology
You might also like to view...
The ________ command removes the selected text or object and stores it in the Clipboard
A) paste special B) copy C) paste D) cut
Computer Science & Information Technology
What are some examples of Software as a Service (SaaS)?
What will be an ideal response?
Computer Science & Information Technology