A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?
A. virus
B. Trojan
C. worm
D. shell
Answer: C
Computer Science & Information Technology
You might also like to view...
Which of the following is a feature of Live bookmarks?
A) Adds RSS technology to bookmarks B) Streams live television programs C) Broadcasts webinars D) Enables you to pin your favorite website images
Computer Science & Information Technology
A list of rules that identify suspected spam messages in Vista is called a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology