A. Worm.
B. Trojan horse.
C. Virus.
D. Macro virus
Related Mcqs:
- An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?
A. Trojan horse.
B. Virus.
C. Time bomb.
D. Time-related bomb sequence. - A program that acts as an intermediary between a user of a computer and the computer hardware:
A. Utility Software
B. Computer Software
C. Operating System
D. Application SoftwareSubmitted by: SUHAIL AHMED KALHORO
- A computer program that converts an entire program into machine language is called a/an
A. Interpreter
B. Simulator
C. Compiler
D. Commander - A computer program that translates one program instructions at a time into machine language is called a/an___________?
A. Interpreter
B. CPU
C. Compiler
D. Simulator - When creating a computer program, the____________designs the structure of the program?
A. End user
B. System Analyst
C. Programmer
D. All of the above - A detailed written description of the programming cycle and the program, along with the test results and a printout of the program is called___________?
A. documentation
B. output
C. reporting
D. spec sheets - Servers are computers that provide resources to other computers connected to a___________?
A. Network
B. Mainframe
C. Supercomputer
D. Client - When you insert a comment in a document, the comment appears in a___________?
A. New window
B. Sidebar
C. sticky note icon bar
D. BalloonSubmitted by: Farhan Rana
- _________ is a type of computing that performs computation, storage and even applications as a service across a network.
A. Cloud Computing
B. Distributed Computing
C. Parallel Computing
D. Virtual ComputingSubmitted by: Malik Asghar Hussain
- Fourth generation mobile technology provides enhanced capabilities allowing the transfer of both____________data, including full-motion video, high-speed internet access, and video conferencing.
A. video data and information
B. voice and non-voice
C. music and video
D. video and audio
The correct answer to the question: "A program that performs a useful task while simultaneously allowing destructive acts is a___________?" is "Trojan horse.".