Which one of the following is designed to execute malicious actions when a certain event occurs or a specific time period elapses?
a. Spyware
b. DDoS
c. Logic bomb
d. Botnet
Answer: c. Logic bomb
Computer Science & Information Technology
You might also like to view...
External SSD drives can be connected using a(n) ________ port
A) USB B) PATA C) HDMI D) WLAN
Computer Science & Information Technology
What does this program segment do?
``` s = 0; i = n; do { s += i; i--; } while (i != 0); ``` * a. Adds all the integers from n down to 1. b. Adds all the integers from 1 to n-1. c. Adds the even integers from 1 to n. d. Adds the odd integers from 1 to n. e. None of the above.
Computer Science & Information Technology