Computer Science
Assertion. A useful looking program may damage data.
Reason. Trojan Horses are useful looking programs which create havoc and damage the data stored.
Computer Networks
2 Likes
Answer
(a)
Both Assertion and Reason are true and Reason is the correct explanation of Assertion.
Explanation
A trojan horse is code hidden in a useful looking program such as a game or spreadsheet that looks safe to run but has hidden side effects. When the program is run, it seems to function as the user expects, but in actuality it is destroying, damaging, or altering information in the background. Therefore, a useful looking program may damage data.
Answered By
3 Likes
Related Questions
Assertion. Crackers and hackers technically do the same thing.
Reason. Crackers do the hacking with malicious intentions to harm the data or system while hackers do the hacking with good intentions to know more about the system or to safeguard it.
Assertion. Viruses, Worms, Trojans, Adware, Spyware are all Malware.
Reason. Malware is a general term to represent data threat Software.
Assertion. Spyware are not harmful as they do not damage data.
Reason. Spyware track data about user and sell it to others hampering your data privacy .
Assertion. Data may be stolen through Eavesdropping.
Reason. Unauthorised monitoring of other people's communication is called Eavesdropping.