____ can attach themselves to a legitimate computer file, replicate to other programs, and deliver various payloads.
A. Snakes
B. Viruses
C. Bacteria
D. Worms
Answer: B
Computer Science & Information Technology
You might also like to view...
When preventing a report, ________ indicate how the report would break across pages if you print it
Fill in the blank(s) with correct word
Computer Science & Information Technology
What is the purpose of an amortization table?
What will be an ideal response?
Computer Science & Information Technology