A. Memory or disk space.
B. Time.
C. CD drives space.
D. CD-RW.
0
What type of virus uses computer hosts to reproduce itself?
0
In 1999, the Melissa virus was a widely publicised:____________?
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus
0
An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?
A. E-mail virus.
B. Macro virus.
C. Trojan horse.
D. Time bomb.
0
A program that performs a useful task while simultaneously allowing destructive acts is a___________?
A. Trojan horse.
B. Virus.
C. Time bomb.
D. Time-related bomb sequence.
0
Malicious software is known as____________?
A. Worm.
B. Trojan horse.
C. Virus.
D. Macro virus
0
Collecting personal information and effectively posing as another individual is known as the crime of_____________?
A. Badware.
B. Malware.
C. Maliciousware.
D. Illegalware
0
The common name for the crime of stealing passwords is____________?
A. Spooling.
B. Identity theft.
C. Spoofing.
D. Hacking.
0
The typical computer criminal is a(n)____________?
A. Jacking.
B. Identity theft.
C. Spoofing.
D. Hacking.
0
The computer abbreviation KB usually means____________?
A. Young hacker.
B. Trusted employee with no criminal record.
C. Trusted employee with a long, but unknown criminal record.
D. Overseas young cracker.
Download App