1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bagirrra123 [75]
3 years ago
8

A (n) _____, similar to a trojan horse, installs monitoring software in addition to the regular software that a user downloads o

r buys. Internet worm Bot Middleware Spyware
Computers and Technology
2 answers:
galina1969 [7]3 years ago
5 0

Answer:

Spyware

Explanation:

Internet is a type of computer network that allow device communicate with each other world wide. So, it is not the correct option.

Worm: this is a standalone malware computer program that replicates itself in order to spread to other computers. It spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage. The major feature of a worm is ability to replicate on it own. So, it is not the correct option.

Bot: this is a software application that runs automated tasks. So, it is not the correct option.

Middleware: this is software that lies between an operating system and the applications running on it, enabling communication and data management. It provides services to software applications beyond those available from the operating system. So, it is not the correct option.

Spyware: this is the correct answer. Spyware is similar to trojan horse because it hides itself in a system and a user may not know that it exist on the system. Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information without knowledge of the user.

andreev551 [17]3 years ago
3 0

Answer:

Spyware

Explanation:

Computer network systems are intercommunication of connected devices, to share resources within and to other remote networks. Network security policies and technical control system technologies are used by a network or system administrator to prevent unauthorized and unauthenticated access to user account in the network by cyber attackers.

Cyber attackers are individuals or group of individuals with the traditional hacking skills to exploit network and system vulnerabilities, to steal information. Malwares are used by hackers to covertly access networks. The spyware is a monitoring Trojan horse malware, used to monitor the activities of a user, steal information for fraudulent purposes.

You might be interested in
The total number of possible keys for des is _________, which a modern computer system can break in a reasonable amount of time.
FinnZ [79.3K]
The answer is two. Most people think it's one but it's 2
3 0
3 years ago
Two strategies for keeping your files in sync
zlopas [31]

Answer:

1. MS Cloud

2. G Drive

Explanation:

5 0
3 years ago
Corey wrote a code that will display his name every time he presses the down arrow key but there is a bug in it. Display letter
brilliants [131]

Answer:

Explanation:

display letter c, type letter r, type letter o, type letter 3, type letter y- i think thats it but i dee cay this is confusing

7 0
3 years ago
Is the following a true statement in our world? Why or why not?
posledela

Answer:

The statement would be true

.

Explanation:

let,  L = is a NFL player

      M = teaches in CSU

      N = has tattoos

Given that:

nfl player who teaches in csu = L^ M                 (this is false every time)

Above statement is L ^ M -> N

this would be true because

false -> true                  (true

)

false -> false                  (true

)

Second  exp:

There are no players who teach in Csu therefore if we say they all have tattoos statement would be true.

4 0
3 years ago
Information​ technology, especially the use of​ networks, can help firms lower the cost of​ ________, making it worthwhile for f
aniked [119]

Answer:

MARKET PARTICIPATION.

Explanation:

<em>Because this way the firm size can stay constant or contract even if the company increases its revenues. Information technology helps firms contract in size because it can reduce transactions costs. According to the transaction cost theory, firms and individuals seek to economize on transaction costs, much as they do on prodcution costs. For instance, by using computer links to external suppliers, the Chrylser Corporation can achieve economies by obtaining more than 70 percent of its parts from other companies.</em>

5 0
3 years ago
Other questions:
  • True or False<br><br> The signing of Act 26 made Cyber Harassment of a Child a crime.
    14·1 answer
  • What character separates the file extension and the filename?
    13·2 answers
  • The graph shows that sixty-eight percent of students think cyberbullying is a problem. One hundred human stick figures are shown
    14·2 answers
  • Why bootable installer preparation is important? explain
    9·1 answer
  • What reforms were made by the British government in India after the war of independence? write any three
    5·1 answer
  • Select the correct answer.
    10·1 answer
  • Write a program that lets the user perform arithmetic operations on fractions. Fractions are of the form a/b, in which a and b a
    11·1 answer
  • Word can only print documents on one size of paper.<br><br> True or false
    15·1 answer
  • How do i mark brainliest?
    6·2 answers
  • Why is a salt added to a password that is being stored in a database?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!