A Trojan can do which of the following?

a. Delete files.
b. Open a backdoor on the infected system.
c. Install a key logger or other spyware on the infected system.
d. All the above.

ANS: D

Computer Science & Information Technology

You might also like to view...

A(n) ________ can be selected or deselected when the person using the form clicks the content control

Fill in the blank(s) with correct word

Computer Science & Information Technology

Construct your own example of an E-R or UML diagram whose direct translation into the relational model has an anomaly similar to that of the Person entity.

An example is the Employee relation, depicted below, in which an employee can have several dependents.

Computer Science & Information Technology