A __________ is a program inserted into software that lies dormant until a predefined condition, which triggers an unauthorized act, is met.
A. logic bomb
B. trapdoor
C. worm
D. Trojan horse
A. logic bomb
Computer Science & Information Technology
You might also like to view...
Which of the following is NOT an example of asynchronous communications at work?
A) IM conversations B) video streaming C) message boards D) e-mail lists
Computer Science & Information Technology
In the Animation Pane, no ________ indicates that an animation automatically starts after the previous animation
Fill in the blank(s) with correct word
Computer Science & Information Technology