The malware which appears as a harmless object but attack...
The malware which appears as a harmless object but attack it's victims at the slightest opportunity is called
Worm
Trojan horse
Macro virus
Logic bomb
Correct answer is B
No explanation has been provided for this answer.
What kind of relationship exists between users and products as shown in Figure 4? ...
Ensuring the correctness and consistency of data is referred to as data ...
Computer malware is detected by ...
To access a website, the URL of the website is typed into the part labelled ...
Computer ethical practises include the following except ...
The design output of a graphic package can be in the following file formats except ...
In the model; Furniture (Table, Chair, Wardrobe) Furniture is... ...
Basic computer operations include the following except ...
A relational database model is designed according to set of rules known as ...
Which of the following computer types represents data as variable and continuous values? ...