Answer:
D- Trojan Horse
Explanation:
Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.
Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.
Answer:
struct node{
student data;
node* next;
};
Explanation:
The above written is the segment of code is the structure of node of the linked list.The data of the node is type student.So the data of the node of the linked list will consist of the student details and the next is the pointer which holds the address of the next node.
Catherine's team is using the concept of on-off device by using a single transmitter to reach multiple receivers.
<h3>What is a device?</h3>
It should be noted that a device simply means something that is adapted for a particular purpose especially an electronic equipment.
In this case, Catherine's team is using the concept of on-off device by using a single transmitter to reach multiple receivers.
Learn more about device on:
brainly.com/question/24786034