A virus attack is also known as a ________

A) logic bomb B) moneyload C) time bomb D) payload

D

Computer Science & Information Technology

You might also like to view...

A computer converts raw data into information

Indicate whether the statement is true or false

Computer Science & Information Technology

A TCP session can be hijacked only before the hosts have authenticated successfully.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology