A virus attack is also known as a ________
A) logic bomb B) moneyload C) time bomb D) payload
D
Computer Science & Information Technology
You might also like to view...
A computer converts raw data into information
Indicate whether the statement is true or false
Computer Science & Information Technology
A TCP session can be hijacked only before the hosts have authenticated successfully.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology