____________________ are malware programs that hide their true nature and reveal their designed behavior only when activated.
A. Viruses
B. Worms
C. Spam
D. Trojan horses
Answer: D
Computer Science & Information Technology
You might also like to view...
RSVP was designed for
a. accessing web pages b. securely transmitting and receiving web content c. remote access and login capabilities d. reserving resources in a network
Computer Science & Information Technology
Ginger wants to ensure that none of the original data in the image for the Web site is thrown out. Which of the following image file formats could she use?
a. only GIF b. only PNG c. only JPEG d. either GIF or PNG
Computer Science & Information Technology