Computer Science
A harmful program in the disguise of a useful program is called ……………
- Trojan horse
- Worm
- Spam
- Computer virus
Computer Networks
3 Likes
Answer
Trojan horse
Reason — A Trojan Horse is code hidden in a useful looking program such as a game or spreadsheet that looks safe to run but has hidden side effects.
Answered By
2 Likes
Related Questions
A security mechanism that can be created in hardware and software both to prevent the unauthorised access to and from a network is called ……………
- Anti-virus
- Network security
- Authentication
- Firewall
Unauthorised electronic junk mail is called ……………
- Trojan horse
- Worm
- Spam
- Computer virus
A program capable of replicating itself and eating up all the memory is a ……………
- Trojan horse
- Worm
- Spam
- Computer virus
What out of the following, will you use to have an audio-visual chat with an expert sitting in a far-away place to fix-up a technical issue?
- VoIP
- FTP