…………… programs can be used to accomplish functions
indirectly that an unauthorized user could not accomplish directly.
a) Zombie
b) Worm
c) Trojan Horses
d) Logic Bomb
indirectly that an unauthorized user could not accomplish directly.
a) Zombie
b) Worm
c) Trojan Horses
d) Logic Bomb