The following are desturctive software except
...The following are desturctive software except
Drivers
Worms
Trojan horses
Logic bomb
Correct answer is A
No explanation has been provided for this answer.
A teacher computed the average score of students in given test ...
The use of the internet to perform illegal activities is generally called ...
The type of data which consist of text, number, audio, graphic and animation is called ...
In Database Management System (DBMS), linking entities is used to represent? ...
Which of the following is not a type of wireless transmission ...
The rpocess of gathering facts and statistics from different sources is known as data ...
Which of the following is not used for online shopping? ...
Extracting information in Database Management System (DCMS) involves ...