English

Q171

An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?

Q172

A program that performs a useful task while simultaneously allowing destructive acts is a___________?

Q174

Collecting personal information and effectively posing as another individual is known as the crime of_____________?

Q175

The common name for the crime of stealing passwords is____________?

Q176

The typical computer criminal is a(n)____________?

Q179

Large transaction processing systems in automated organisations use___________?

Scroll to Top