Which of the following Language is used with an interpreter?
Which of the following describes programs that can run independently travel from system to system and disrupt computer communication?
Which of the following virus overtake computer system, when it boots and destroy information..
What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
A virus that migrates freely within a large population of unauthorized email user is called a
Which of the following places the common data elements in order from smallest to largest?
Which protocol assigns IP address to the client connected in the internet?
Which of the following services use TCP?