Johns computer has been attacked by a program in which malicious code was contained inside apparently harmless data in such a way that it got control and did damage. What is this type of program called?
A.
Virus
B.
Worm
C.
Trojan horse
D.
Trapdoor
Explanation:
A Trojan horse is program code that can act without the express knowledge of the user, often hidden inside legitimate-looking software.