1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVEN [57.7K]
2 years ago
15

Is designed to access a computer or operating system without the knowledge or permission of the user.

Computers and Technology
1 answer:
kramer2 years ago
5 0

Answer:

Spyware

Explanation:

Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user.

You might be interested in
Assume that the following variables have been properly declared and initialized.
grandymaker [24]

Answer:

       if (option1.equals(option2)){

           rsvp = true;

       }

       System.out.println(rsvp);

A full program is given in the explanation section

Explanation:

import java.util.Scanner;

public class Option {

   public static void main(String[] args) {

       boolean rsvp = false;

       int selection;

       String option1,option2;

       Scanner in = new Scanner(System.in);

       option1 = in.next();

       option2 = in.next();

       if (option1.equals(option2)){

           rsvp = true;

       }

       System.out.println(rsvp);

   }

}

4 0
3 years ago
Assume a PHP document named hello.php has been saved in a folder named carla inside the htdocs folder on your computer. Which is
iVinArrow [24]

The available options are:

A. localhost/Carla/hello.php

B. localhost/htdocs/hello.php

C. localhost/htdocs/Carla/hello.php

D. carla/hello.php5

Answer:

C.  localhost/htdocs/Carla/hello.php  

Explanation:

A path in computer programming can be defined as the name of a file or directory, which specifies a unique location in a file system.

Therefore, to get the correct path to enter to view this page in a browser, one needs to follow the directory tree hierarchy, which is expressed in a string of characters in which path components, separated by a delimiting character, represent each directory.

Hence, correct path to enter to view this page in a browser is "localhost/htdocs/Carla/hello.php"

6 0
3 years ago
. is the language that Web pages are written in?(PHP,XML,HTML,Javascript)
dalvyx [7]

Answer:

<em>HTML</em><em>(</em><em>hypertext</em><em> </em><em>markup</em><em> </em><em>language</em><em>)</em><em> </em>is the language that Web Pages are written in.

4 0
3 years ago
Read 2 more answers
What is the minimum number of bits required to store 11 different values?
yawa3891 [41]

Answer:

4 bits are required. 4 bits can represent 16 different values (2*2*2*2 or ). 3 bits can only represent 8 different values. In the general case n bits can represent values, or correspondingly m values can be represented by bits.

5 0
3 years ago
How to start learning c++?
ololo11 [35]
Learning C++ is one of the best languages to learn accounting to many people I know. But to learn C++, it is a good Idea to find a mentor or friends who know it to teach you, join programming clubs and read computer forums and books. Especially books because that Is actually one of the best ways to learn. I have learned this and many of my friends would also agree. But perhaps the best way I know is programming language schools or free classes. These are the ways to jump start. If you have more questions, ask me in private chats. I have some contacts/sites that you can learn from.
7 0
3 years ago
Other questions:
  • Which answer would it be?
    12·1 answer
  • ____________ are collected from several entities at the same point in time.
    13·1 answer
  • Which of these is an aggregator?
    9·2 answers
  • What is the effect of this program?
    5·1 answer
  • What are the 4 features of the month-end review tool in quickbooks online accountant?
    14·1 answer
  • ____ returns the maximum number of elements that can be inserted into the vector container vecCont without reallocation.
    9·1 answer
  • List any three importance of computer points​
    8·1 answer
  • Explain the different type of shift register counter ​
    14·1 answer
  • ASAP BRAINLIEST!!!!!!
    5·2 answers
  • IP ______ occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!