Answer:
The answer is "option D"
Explanation:
Trojan horse is a software, that is installed on a system and appears benign, but in actual it is the addition of malicious which unexpected modifications in config files and unusual activity even when the computer is idle are strong signs that a Trojan exists on a system. and other options are not correct that can be described as follows:
- In option A, It is a malware that is also known as Trojan.
- In option B, It is malware, not a virus but the malware includes viruses.
- In option C, It doesn't install spyware on the user's computer.
- In option E, It doesn't use for enterprise networks to penetrate.
Explanation:
it can take up a great deal of time in class.
it can be distracting in the middle of a lecture.
it can cause the student to miss information.
Something that isn't subject to copyright.
The blanks spaces are filled with the following;
- Is confidential, should not
- There's risk of information theft on the cloud
- Social security number, should not
<h3>Confidential information and the storage cloud</h3>
According to McGinley, in some cases, storing any type of personal information for one's self or one's customers in the cloud would be a mistake. Information relating to date of birth, Social Security number, passport numbers should not be kept in the cloud.
This follows from the fact that "Cloud providers are no less bulletproof than any of the other previous industry."
Read more on information storage;
brainly.com/question/24688176