uerades as a useful program malicious sofrware that masquerades as a a Spyware .
ID: 139851 • Letter: U
Question
uerades as a useful program malicious sofrware that masquerades as a a Spyware . A Trojan horse c.A virus d. A worm As th 7. Aonnects compurers located in a geographicly clog a. LAN b WAN c. WAP d. VPN Microsofe Windows, DOS, and Mac OS X are examples of a application sofrware. b. operating systems. c sprcadsheets. impo 8. ear is cors b. d. database sofrware. 9. Storing and accessing daca and programs over the Internet is known a a phishing b. digital certificates. c. cloud computing d. infrastructure 3. 10. The CHTS cegaification exams do not measure an individual's co regard to a. installing and testing systems. b. diagnosing IT problems. c. selecting hardware and software. mpecn g s s 6. 7. d. programming software. 8. 152 ChapExplanation / Answer
6. b Trojen horse is malicious software that masquerades as a useful programme.
7. a. LAN connect computers located in a geographically close area.
8.Microsoft windows,DOS and MAX OS X are examples of b. Operating systems.
9.Storing and accessing data and programmes over the internet is known as c.Cloud computing.
10. The CHTS certification exams do not measure an individual competency level regard to
d. Programming software.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.