A __________ is a program inserted into software that lies dormant until a predefined condition, which triggers an unauthorized act, is met.

A. logic bomb
B. trapdoor
C. worm
D. Trojan horse

A. logic bomb

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT an example of asynchronous communications at work?

A) IM conversations B) video streaming C) message boards D) e-mail lists

Computer Science & Information Technology

In the Animation Pane, no ________ indicates that an animation automatically starts after the previous animation

Fill in the blank(s) with correct word

Computer Science & Information Technology