The malware which appears as a harmless object but attack...
The malware which appears as a harmless object but attack it's victims at the slightest opportunity is called
Worm
Trojan horse
Macro virus
Logic bomb
Correct answer is B
No explanation has been provided for this answer.
Commonly accepted practices, rules or methods in computing are called ...
Responsibilities of a database administrator includes the following except performing ...
Which of the following file organizations requires primary Key? ...
The spreadsheet symbol used to convert a number to a label is ...
The following are primary sources of information except ...