1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
satela [25.4K]
3 years ago
11

What is the difference in adware and spyware

Computers and Technology
2 answers:
Katarina [22]3 years ago
3 0

Generally speaking, adware is a program that installs an additional component that feeds advertising to your computer, often by delivering pop-up ads or by installing a toolbar in your browser.

Some adware may hijack your browser start or search pages, redirecting you to sites other than intended. Unless you're a fan of guerrilla marketing, such tactics can be annoying. Worse, the mechanism that feeds the advertising can introduce system anomalies or incompatibilities that cause problems with other programs and can even disrupt the functioning of the operating system.

Spyware surreptitiously monitors your computer and internet use. Some of the worst examples of spyware include keyloggers who record keystrokes or screenshots, sending them to remote attackers who hope to glean user IDs, passwords, credit card numbers, and other sensitive information.

Most often, though, spyware takes a more benign but still quite offensive form. The information gathered, often referred to as "traffic data," can consist of monitoring the websites visited, ads clicked, and time spent on certain sites. But even in its more benign form, the collected data can morph into something far more insidious.

Hope this helped.. ;D

Marianna [84]3 years ago
3 0
Adware will show, as the name says, (unwanted) ads on your PC.
Spyware will send information about you or your computer to the person that made the spyware, this is often if not always without the knowledge of the infected user.
You might be interested in
Implement a metho d to nd the k-th largest element in an array of size N using a minimum priority queue (MinPQ). Assume that the
diamong [38]

Sorry don't understand spanish,I am sure you can get it wrong,for crying out loud you people get checks for coming to United States

3 0
3 years ago
If we recorded the average U.S. Housing Price every month for the next year, what graphical display is most appropriate to displ
JulijaS [17]

Answer:

Time plot.

Explanation:

A time plot, also known as a time series can be defined as a graphical representation of a pre-defined value (data) against time.

If we recorded the average U.S. Housing Price every month for the next year, the graphical display which  is most appropriate to display the data is a time plot.

Generally, when representing data that changes with respect to time or that are random in nature; a time plot is considered to be the most effective graphical display to use.

In this scenario, the average U.S. Housing Price that is observed should be plotted against the time of occurrence (months) over a year.

3 0
3 years ago
is a measurement that quantifies how much information can be transmitted over the network. A. Memory B. DMZ C. Bandwidth D. Clou
AnnZ [28]

Answer: Bandwidth....

6 0
3 years ago
What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's dev
Mamont248 [21]

Answer: A. CRYPTO-MALWARE

Explanation: Crypto-malware is a type of ransomware that blocks the uses from accessing the computer system,it also encripts all the files.

This type of ransomware is mainly used to demand for ransom.

This type of ransomware which makes use of sophisticated and advanced ransomware technology to ensure that encripting must be with a unique Key or password,the hijacked system is used for crypto mining without the owns consent.

7 0
3 years ago
Read 2 more answers
A company has purchased a new SaaS application and is in the process of configuring it to meet the company's needs. The director
Dominik [7]

Answer:

The answers are letters A and C.

Explanation:

The security administrator should set up the LDAP and SAML configuration, because both of them provides authentication support as their central identity management solution for the company.

6 0
3 years ago
Other questions:
  • What is a Network-layer routing technology that enables a group of workstations to share a single registered address?
    5·1 answer
  • Which is the most likely problem if your computer starts up​ slowly, has many unwanted​ pop-up advertisements, and unusual hard
    5·1 answer
  • How can a user choose settings that will customize a presentation so that it is best to be played automatically at a kiosk rathe
    11·2 answers
  • What list did poe appear on for the search engine lycos?
    11·1 answer
  • What are the main types of computer software?
    5·2 answers
  • Given the integer variables x, y, and z, write a fragment of code that assigns the smallest of x, y, and z to another integer va
    7·1 answer
  • Henry has created a software that manages a database of all his music.he wishes to run the software on another computer system t
    5·1 answer
  • 50 POINTS<br><br>Question linked in file below.
    5·1 answer
  • Your _______ can help block inappropriate content online.<br> 1. web browser<br> 2. Password
    14·1 answer
  • The local Driver's License Office has asked you to write
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!