SOFTWARE ENGINEERING ETHICS AND PROFESSIONAL PRACTICES
SOFTWARE ENGINEERING CODE OF ETHICS AND PROFESSIONAL PRACTICE
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
This is a destructive code that gains access to a computer disguised as something such as a desirable software program. Once inside the computer, it can do damage but it cannot spread from disk to disk or computer to computer.
|
Computer worm
|
|
Adware
|
|
Trojan Horse
|
|
Computer Bomb
|
Explanation:
Detailed explanation-1: -Trojan. A Trojan disguises itself as desirable code or software. Once downloaded by unsuspecting users, the Trojan can take control of victims’ systems for malicious purposes.
Detailed explanation-2: -Worm Malware – Self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks.
There is 1 question to complete.