101.
A program that performs a useful task while simultaneously allowing destructive acts is:

102.
In 1999, the Melissa virus was a widely publicized:

103.
An intentionally disruptive program that spreads from program to program or from disk to disk is known as

104.
Malicious software is known as:

105.
Collecting personal information and effectively posing as another individual is known as the crime of:

106.
The common name for the crime of stealing passwords is:

107.
The majority of computer crimes are committed by:

109.
When a logic bomb is activated by a time-related event, it is known as a:

110.
A logic bomb that was created to erupt on Michelangelo's birthday is an example of a: