A______is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date

a. denial-of-service attack b. logic bomb
c. botnet d. rootkit

b

Business

You might also like to view...

A may not be the most appropriate choice in which of the following situations?

a. When the research objective is to describe characteristics of an existing market situation b. When the research objective is to evaluate current marketing mix strategies c. When the research objective is to determine the when, where, and how for the target population d. When the research objective is to identify relationships between variables e. When the research objective is to gain an insight into the deeper emotions or feelings behind a purchase decision

Business

A trained researcher was paid to visit a home with three preschoolers every day for two weeks to observe the children's bath time. This is an example of ________

A) a focus group B) experimental research C) a case study D) descriptive research E) ethnography

Business