A self-contained program that spreads through a computer network by exploiting security holes is called a
a. hack.
b. rogue.
c. Trojan horse.
d. virus.
e. worm.
E
Computer Science & Information Technology
You might also like to view...
Which of the following is TRUE about how typical text looks on a slide?
A) Each subsidiary item is bolded and the font size is smaller. B) Each subsidiary item is indented and the font size is larger. C) Each subsidiary item is indented and the font size is smaller . D) Each subsidiary item is italicized, bolded, and the font size is smaller.
Computer Science & Information Technology
It is much easier to test relationships, data integrity rules, input masks, and other field properties after creating forms than it is to test them before creating the forms.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology