____ can attach themselves to a legitimate computer file, replicate to other programs, and deliver various payloads.

A. Snakes
B. Viruses
C. Bacteria
D. Worms

Answer: B

Computer Science & Information Technology

You might also like to view...

When preventing a report, ________ indicate how the report would break across pages if you print it

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is the purpose of an amortization table?

What will be an ideal response?

Computer Science & Information Technology