A. firmware
B. shareware
C. software
D. utility

Correct Answer:

Option C – software

SEE ALSO  The following actions are sources of breaches in computing except?

Copyright warnings! Do not copy.