A virus appears to be a useful application but it includes a malicious component
Indicate whether the statement is true or false
False This describes a Trojan horse.
Computer Science & Information Technology
You might also like to view...
You can start the Task Manager by using the shortcut keys Ctrl + Esc
Indicate whether the statement is true or false
Computer Science & Information Technology
The hole in a compound path is also known as the ____ space.
A. negative B. positive C. compounded D. complex
Computer Science & Information Technology