COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
____ hides within a program that looks legitimate; not capable of replicating itself.
A
Worms
B
Virus
C
Spyware
D
Trojan
Explanation: 

Detailed explanation-1: -Unlike viruses, Trojan Horses do not replicate themselves, but they can be just as destructive. Trojans also open a backdoor entry to your computer, giving command to malicious actor or allowing malicious users/programs access to your system.

Detailed explanation-2: -Unlike computer viruses, a Trojan horse cannot manifest by itself, so it needs a user to download the server side of the application for it to work. This means the executable (.exe) file should be implemented and the program installed for the Trojan to attack a device’s system.

There is 1 question to complete.