Malicious software that hides inside a legitimate program is called a(n) ________

Fill in the blank(s) with correct word

Trojan horse

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a feature of SharePoint collaboration?

A) Save and reuse your own or others' presentations stored in the library. B) Online discussions as presentations are being developed. C) Receive e-mail notifications when slides are changed in the library. D) Store presentations in a document workspace.

Computer Science & Information Technology

What is displayed after code corresponding to the following pseudocode is run?

```Set X = 15 Set Y = 25 Set Z = 20 Call Numbers(Y, Z, X) Subprogram Numbers(A, B, C) Write A + “ “ + B + “ “ + C End Subprogram``` a. 15 25 20 b. 15 20 25 c. 20 25 15 d. 25 20 15

Computer Science & Information Technology