A. Program B. computer C. bad man D. beast
A. exe file B. com file C. TSR program D. data file
A. Booting a PC from an infected mediu. B. executing an infected program. C. pirated software and shareware. D. All of the above.
A. floppy disks or other media that users can exchange B. E-mail attachments C. pirated software and shareware D. All of the above
A. hide its own code B. steal storage and pilfer CPU cycles C. delete files D. play music