A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?

A. virus
B. Trojan
C. worm
D. shell

Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following is a feature of Live bookmarks?

A) Adds RSS technology to bookmarks B) Streams live television programs C) Broadcasts webinars D) Enables you to pin your favorite website images

Computer Science & Information Technology

A list of rules that identify suspected spam messages in Vista is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology