Which of the following is NOT an example of malware?

A. trojan horses
B. zombies
C. vaporware
D. worms

Answer: C

Computer Science & Information Technology

You might also like to view...

A data table with five rows and five columns must have ________ input variables

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

How can multiple distinct physical network topologies be combined into a single network structure?

A. Deploy a star topology. B. Deploy a ring topology. C. Deploy a tree topology. D. Deploy a bus topology.

Computer Science & Information Technology