COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A program that hides within or looks like a legitimate program
A
Adware
B
Spoofing
C
Spyware
D
Trojan horse
Explanation: 

Detailed explanation-1: -Spyware works like adware but is usually a separate program that is installed unknowingly when you install another freeware type program or application. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application.

Detailed explanation-2: -Like adware, spyware is also frequently installed by the user unknowingly when downloading applications from the Web. Trojan horses. Programs that appear to be legitimate, but in fact are malicious. Backdoor Trojans: Trojan horse programs that allow a hacker to control your computer remotely.

Detailed explanation-3: -In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer.

There is 1 question to complete.