1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viktelen [127]
3 years ago
12

Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?

Computers and Technology
2 answers:
Nadusha1986 [10]3 years ago
8 0
This is called spyware, so I'd say it would be a Trojan Horse, since those can install without alerting anything really.
STatiana [176]3 years ago
3 0
That would be what is known as Spyware, a common form of this is known as a "Trojan Horse". This type of malware is typically latched on and hidden within files, such as when downloading a pirated version of a song, game, art-work, etc...
You might be interested in
"explain why professional software is not just the programs that are developed for a customer"
Darina [25.2K]

To put it into simple terms, software is always a continuous process of coding and updating, thus, you will never code and be done. Professional software not only consists of programs that are developed for a client, but also the compilation of documentation, configuration of data, support websites, requirements, design manuals, and evolution to make these programs operational and complete. 

A professionally done software system consists of more than one program and configuration files used to set up these programs.






5 0
3 years ago
Jody should select the
Alex Ar [27]

Answer:

In the View tab, you will find Zoom Option. Set the Zoom level to 100%.

Explanation:

You need to set the Zoom level to 100%, And you can do this, by setting the zoom level to 100%, from the scroll bar. Or you can move to view tab in the main menu, and then in the Ribbon, you need to select the zoom % and set it to 100 percent. You will then be able to see the entire page. And if you want, you can increase the Zoom level to even further, for getting an even more clearer picture.

3 0
4 years ago
How do i build a supercomputer.?
stira [4]
You will need one head node, at least a dozen identical compute nodes, an Ethernet switch, a power distribution unit, and a rack. Determine the electrical demand, cooling and space required. Also decide on what IP address you want for your private networks, what to name the nodes, what software packages you want installed, and what technology you want to provide the parallel computing capabilities
3 0
4 years ago
Which group allows you to add notes to your presentation?
aleksandrvk [35]

Answer:

Presentation views

Explanation:

6 0
3 years ago
Read 2 more answers
What is the simplest way to permanently get rid of an unwanted file? A. Cancel the file. B. Go to the Start menu and then delete
Morgarella [4.7K]
Go to the Start menu and then delete the file <span>is the simplest way to permanently get rid of an unwanted file</span>
5 0
4 years ago
Other questions:
  • Alto Innovations creates custom software for organizations. The company's managers want to build a high-performance culture in t
    11·1 answer
  • With respect to the five components of social media information systems (SMIS), which of the following statements is true of SM
    11·1 answer
  • There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
    5·1 answer
  • Select the correct images Jane has to pick images that portray action photography. Which of these images would she pick? please
    9·1 answer
  • What could be a pass word if the hint is stayton its for windows 10 <br><br> please help
    5·1 answer
  • Aisha designed a web site for her school FBLA club. Which item should Aisha consider for improved responsive design?
    6·2 answers
  • The process of identifying and removing logical errors and runtime errors is called ..............
    5·2 answers
  • Which of the following is the fastest computer processing speed?
    10·1 answer
  • Explain how information in an access log could be used to identify the true identity of an impostor who has acquired unauthorize
    13·1 answer
  • I will give brainyest
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!