English

Q102

The typical computer criminal is a(n)____________?

Q103

The common name for the crime of stealing passwords is____________?

Q104

Collecting personal information and effectively posing as another individual is known as the crime of_____________?

Q106

A program that performs a useful task while simultaneously allowing destructive acts is a___________?

Q107

An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?

Q108

In 1999, the Melissa virus was a widely publicised:____________?

Q110

The thing that eventually terminates a worm virus is a lack of:

Scroll to Top