Technology

which of the following is NOT an example of malicious code?
A Trojan horse
B Worm
C virus
D spy gear
i really need help on Technology
i think the answer is d

  1. 👍 0
  2. 👎 0
  3. 👁 144
  1. Yes, D is the correct answer. All the others are malicious.

  2. thx Writeacher

    1. 👍 0
    2. 👎 0
  3. You're welcome.

Respond to this Question

First Name

Your Response

Similar Questions

  1. Technology

    Which of the following is not an example of malicious code? A. Trojan horse B. worm C. virus D. spy gear**

    asked by Laci on February 24, 2016
  2. Education technology

    Which of the following is not an example of malicious code? A. Trojan horse B. worm C. virus D. spy gear ••

    asked by Bryan on May 6, 2016
  3. computers and cyber-security

    Which cyberattack carries the most serious threat? A Trojan horse virus targets computers at all public libraries. A phishing attack on a chain store compromises customer data. A malware attack shuts down the power plants in a

    asked by Anonymous on August 23, 2018
  4. History

    Which cyberattack carries the most serious threat? A phishing attack on a chain store compromises customer data. A malware attack shuts down the power plants in a large city. Hackers launch a malicious code that shuts down

    asked by Heather on August 5, 2018
  5. Criminal Justice/White Collar Crime

    An authorized program planted on a computer is known as a(n): A. Trojan Horse. B. Achilles Heel. C. Sword of Damocles. D. Cyclops Eye. My textbook only mentions an "unauthorized program" which is a Trojan Horse. But I looked on

    asked by Pat on September 26, 2015
  6. IT-240

    • Define each of the following terms in your own words: o Boot sector o File o Multipartite o Macro o Trojan horse o Email worms o Instant messaging worms o IRC worms o File-sharing networks worms o Internet worms • Explain

    asked by jram on January 22, 2009
  7. IT-240

    • Define each of the following terms in your own words: o Boot sector o File o Multipartite o Macro o Trojan horse o Email worms o Instant messaging worms o IRC worms o File-sharing networks worms o Internet worms • Explain

    asked by jram on January 22, 2009
  8. science

    parasitic worm infestation is hypothesized to be damaging to the host. However scientists have recently discovered that worm infestation of certain autoimmune disorders. in which of the following ways should the hypothesized to be

    asked by ianko on March 29, 2017
  9. science

    parasitic worm infestation is hypothesized to be damaging to the host. However scientists have recently discovered that worm infestation of certain autoimmune disorders. in which of the following ways should the hypothesized to be

    asked by mae on November 23, 2016
  10. it210

    Design a program that models the worm's behavior in the following scenario: A worm is moving toward an apple. Each time it moves, the worm cuts the distance between itself and the apple by its own body length until the worm is

    asked by Bonnie on January 22, 2010

More Similar Questions