Which of the following is NOT an example of malware?
A. trojan horses
B. zombies
C. vaporware
D. worms
Answer: C
Computer Science & Information Technology
You might also like to view...
A data table with five rows and five columns must have ________ input variables
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
How can multiple distinct physical network topologies be combined into a single network structure?
A. Deploy a star topology. B. Deploy a ring topology. C. Deploy a tree topology. D. Deploy a bus topology.
Computer Science & Information Technology