A virus appears to be a useful application but it includes a malicious component

Indicate whether the statement is true or false

False This describes a Trojan horse.

Computer Science & Information Technology

You might also like to view...

You can start the Task Manager by using the shortcut keys Ctrl + Esc

Indicate whether the statement is true or false

Computer Science & Information Technology

The hole in a compound path is also known as the ____ space.

A. negative B. positive C. compounded D. complex

Computer Science & Information Technology