____________________ are malware programs that hide their true nature and reveal their designed behavior only when activated.

A. Viruses
B. Worms
C. Spam
D. Trojan horses

Answer: D

Computer Science & Information Technology

You might also like to view...

RSVP was designed for

a. accessing web pages b. securely transmitting and receiving web content c. remote access and login capabilities d. reserving resources in a network

Computer Science & Information Technology

Ginger wants to ensure that none of the original data in the image for the Web site is thrown out. Which of the following image file formats could she use?

a. only GIF b. only PNG c. only JPEG d. either GIF or PNG

Computer Science & Information Technology