Different types of programs that are designed to be harmful to your computer are called ________

A) hijackers
B) spam
C) malware
D) spim

C

Computer Science & Information Technology

You might also like to view...

Which one of the four keywords in SQL is used to determine how rows will be sorted?

A) ORDER BY B) SORT C) SELECT D) WHERE

Computer Science & Information Technology

An SATA hard disk from a failed desktop or laptop computer must be installed into another computer before data copying or recovery can take place

Indicate whether the statement is true or false

Computer Science & Information Technology