SOFTWARE ENGINEERING

SOFTWARE ENGINEERING ETHICS AND PROFESSIONAL PRACTICES

SOFTWARE ENGINEERING CODE OF ETHICS AND PROFESSIONAL PRACTICE

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
This is a destructive code that gains access to a computer disguised as something such as a desirable software program. Once inside the computer, it can do damage but it cannot spread from disk to disk or computer to computer.
A
Computer worm
B
Adware
C
Trojan Horse
D
Computer Bomb
Explanation: 

Detailed explanation-1: -Trojan. A Trojan disguises itself as desirable code or software. Once downloaded by unsuspecting users, the Trojan can take control of victims’ systems for malicious purposes.

Detailed explanation-2: -Worm Malware – Self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks.

There is 1 question to complete.