Start learning 50% faster. Sign in now
A Trojan horse is malware that appears to be a legitimate program but carries malicious operations under the hood. Users often unknowingly install Trojans, which then allow unauthorized access or cause harm, such as data theft or system compromise. Why Other Options are Wrong: a) A virus is a self-replicating program but does not disguise itself as legitimate software. b) Worms spread through networks but do not disguise themselves like Trojans. d) Spyware collects data secretly but is not disguised as legitimate software. e) Ransomware locks users out of their system or files but does not disguise itself as legitimate software.
Which fundamental rights in the Indian constitution were inspired by the U.S. Constitution?
Which of the following Articles of the Indian Constitution are related to citizenship?
Which constitutional article mandates equal pay for equal work in India?
Who presides over the joint sessions of both Houses of Parliament in India?
Which article of the Indian Constitution gives the right to every citizen to seek constitutional remedy from the Supreme Court when they have been depri...
The Family Courts Act of 1984 authorizes which entity to establish Family Courts?
Which of the following indices is not considered while calculating Human Development Index (HDI)?
As envisaged in the Constitution of India with respect to the Supreme Court (Number of Judges) Amendment Act, 2008 (11 of 2009)', there shall be a Supre...
According to Article 243G of the Indian Constitution, which entity is mandated to plan for economic development and social justice?
Under which Article of the Indian Constitution is the government required to uphold social welfare and labor laws to ensure a life of dignity for worker...