Critical Thinking QuestionsCase 1-2John's new computer has started to perform oddly and he is concerned that it may have become infected with malware. He knows that you work for a company that produces antivirus software so he gives you a call to ask for advice. What do you tell him is the difference between a worm and a Trojan horse?
What will be an ideal response?
A worm is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network. A Trojan horse (named after the Greek myth) is a program that hides within or looks like a legitimate program. A certain condition or action usually triggers the Trojan horse. Unlike a virus or worm, a Trojan horse does not replicate itself to other computers.
You might also like to view...
Choose the graphic format that is best-suited to display photographs on web pages
a. jpg b. photo c.gif d. psd
Match the following tools with their uses
1. The most notable early hacking group a. Plovernet 2. One of the first hacking boards, popular on the West Coast b. Legion of Doom 3. East Coast hacking board that became a breeding ground for hacking groups c. ALTOS 4. The epitome of sophisticated international hacking, originally formed in Germany d. 414 Private 5. Group of teenage hackers who hacked into the Los Alamos military computers in the early 1980s e. 8BBS