After surfing the Internet, Joe, a user, woke up to find all his files were corrupted. His wallpaper was replaced by a message stating the files were encrypted and he needed to transfer money to a foreign country to recover them. Joe is a victim of:
A. a keylogger
B. spyware
C. ransomware
D. a logic bomb
Answer: C. ransomware
Computer Science & Information Technology
You might also like to view...
________ is/are not supported when worksheets are grouped
Fill in the blank(s) with correct word
Computer Science & Information Technology
In the HashTable functions, we had to make sure the client’s hash function did not produce an index outside of the array; yet, we didn’t need a size variable as a private member of HashTable because:
A. the client knows what size the hash table is B. the Array used for the hash table has a length function C. if the hash function is faulty, the index produced must be less than 0 D. we require that the client thoroughly test the hash function
Computer Science & Information Technology