1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
3 years ago
8

____ is used specifically for the purpose of recording keystrokes, logging the programs or web sites accessed, or otherwise moni

toring someone's computer activity.
a. computer monitoring software
b. surveillance software
c. audio software
d. video software
Computers and Technology
2 answers:
Mumz [18]3 years ago
8 0

Answer:

a. computer monitoring software

Explanation:

A computer monitoring software is a program that records everything you do in the computer.

A surveillance software is a program that allows you to monitor in the computer places where cameras have been placed.

An audio software enables you to create and listen to sounds.

A video software allows you to create, view and edit images.

According to this, computer monitoring software is used specifically for the purpose of recording keystrokes, logging the programs or web sites accessed, or otherwise monitoring someone's computer activity.

Hunter-Best [27]3 years ago
5 0
A. computer monitoring software
You might be interested in
Suppose that Alice wants to send Bob a 50 kilobyte message over a 1 Gbps link. The total time required to transmit the message (
svlad2 [7]

Answer:

170 Mbps

Explanation:

Time taken to put data on to the link T1 = 50kB / 1 Gbps = 0.0004096

Time taken for transmission T2 = 2 milliseconds = 2 * 10-3

--> throughput = ( 1 / (1+T2/T1) ) * bandwidth of link

= ( 1 / (1 + 4.8828125) ) * 1 Gbps

= 0.16998672 * 1 Gbps

= 169.98672 Mbps

= 170 Mbps.

8 0
3 years ago
If your computer has a ________, someone else can gain access to it undetected.
irinina [24]
<span>If your computer has a rootkit, someone else can gain access to it undetected.
</span>The term rootkit denotes a set of software tools <span>typically malicious.
 The purpose of this software is to enable access to a computer or areas of its software that is not otherwise allowed.
</span><span>It is one of the most difficult types of malware to find and remove.</span>
3 0
3 years ago
Which of the following is not a type of bank?
andreyandreev [35.5K]
Where is the following banks that is listed?
3 0
3 years ago
Read 2 more answers
"The _____ of the Open Systems Interconnection (OSI) model generates the receiver’s address and ensures the integrity of message
aleksklad [387]

Answer:

The transport layer

Explanation: Layer 4, is the transport layer of the Open System Interconnection (OSI), that handles message transfer of data between end systems or hosts and ensures complete packets transfer.

7 0
3 years ago
Read 2 more answers
10 sentences about computer parts.
Ahat [919]
One computer part is the CPU, it’s a piece of hardware the last allows your computer to access and interact all the applications and programs. The first ever CPU chip was invented around 4 decades ago. The keyboard is another computer part and it allows the user to type letters and numbers. There are about 104 keys on a keyboard and there are different parts in it. Some of the parts include, control keys, function keys, navigation keys, numeric keypad, and so on. A mouse is another device used with the keyboard to position the cursor. It’s a hand held device that detects two-dimensional motion relative to a surface. This motion is typically translated Into the motion of a pointer on a display, which allows a smooth control of the graphical user. Memory is a device to store all of your information and saved data. The motherboard is the backbone that tied together the computers components at one spot.
6 0
2 years ago
Other questions:
  • A rectangular range of cells with headings to describe the cells' contents is referred to as a
    9·1 answer
  • What is the opportunity cost of computers when moving from point A to point B? -15 DVDs b. What is the opportunity cost of compu
    13·1 answer
  • Hard drives are usually self-contained, sealed devices. Why must the case for the hard drive remain sealed closed?
    8·1 answer
  • Diane wants to maintain a record of grades scored in the fifth, sixth, and seventh grades. She enters her grades and the total p
    13·1 answer
  • Complete a graphic organizer to explain the responsibilities of a borrower
    14·1 answer
  • What tasks do most operating systems perform?
    15·1 answer
  • How network diagram help in scheduling a project? Draw activity network diagram as per given
    7·1 answer
  • 1.
    13·1 answer
  • What is meant by Information Retrieval?
    8·1 answer
  • Stephen is looking through some design diagrams created for a specific application. He spots a diagram which uses a parallelogra
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!