A. E-mail virus.
B. Macro virus.
C. Trojan horse.
D. Time bomb.
Author Archives: Rana Tahir
A.Trojan horse.
B.Virus.
C.Time bomb.
D.Time-related bomb sequence.
A. Worm.
B. Trojan horse.
C. Virus.
D. Macro virus
A. Badware.
B. Malware.
C. Maliciousware.
D. Illegalware
A. Spooling.
B. Identity theft.
C. Spoofing.
D. Hacking.
A. Jacking.
B. Identity theft.
C. Spoofing.
D. Hacking.
A. Young hacker.
B. Trusted employee with no criminal record.
C. Trusted employee with a long, but unknown criminal record.
D. Overseas young cracker.
A. Key Block
B. Kernel Boot
C. Kilo Byte
D. Kit Bit
A. Hard disk
B. Flash drive
C. DVD
D. scanner
A. Online processing
B. Batch Processing
C. Once-a-day Processing
D. End-of-day processing