Trojan Horse
A. | A code segment that misuses its file is called Trojan horse |
B. | good for file accessing |
C. | both (a) and (b) |
D. | none of these |
Answer : A Explanation : |
|
Option: A Explanation : Explanation will come here. Explanation will come here. Explanation will come here. Explanation will come here. Explanation will come here. |