Multiple Choice
When a program can infect other programs by modifying them or inserting itself into the commands of legitimate programs to wreak havoc, we refer to this process as a:
A) virus
B) thread
C) hard-wire
D) scoop
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q25: People with little technical knowledge can become
Q26: Cybercrime falls into three categories: a computer
Q27: When computer hackers attempt to shut down
Q28: What is the purpose of the Internet
Q29: List and describe the top ten tips
Q31: The Internet Crime Complaint Center's 2005 report
Q32: The typical _ investigation begins with a
Q33: Cybercriminals use _ names and images to
Q34: This technique in identity theft involves the
Q35: Describe the concept of phishing or spoofing