Which one of the following is designed to execute malicious actions when a certain event occurs or a specific time period elapses?

a. Spyware
b. DDoS
c. Logic bomb
d. Botnet

Answer: c. Logic bomb

Computer Science & Information Technology

You might also like to view...

External SSD drives can be connected using a(n) ________ port

A) USB B) PATA C) HDMI D) WLAN

Computer Science & Information Technology

What does this program segment do?

``` s = 0; i = n; do { s += i; i--; } while (i != 0); ``` * a. Adds all the integers from n down to 1. b. Adds all the integers from 1 to n-1. c. Adds the even integers from 1 to n. d. Adds the odd integers from 1 to n. e. None of the above.

Computer Science & Information Technology