A malicious program that enters program code without consent and performs destructive actions in the victim's computer files or programs is a(n):

A) encryption device.
B) phishing expedition.
C) computer virus.
D) fidelity bond.

C

Business

You might also like to view...

Complete the following statement

When a company invests in equity securities with 20% to 50% ownership in the investee's _______ stock, the investor can ________ ________ the investee's decisions. These types of investments must be accounted for using the ________ method. What will be an ideal response

Business

What federal law signs liability for the cleanup of sites contaminated with hazardous waste and created a fund to facilitate cleanup?

A. CERCLA B. NEPA C. Clean Water Act D. FIRPTA

Business