1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viktelen [127]
3 years ago
12

Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?

Computers and Technology
2 answers:
Nadusha1986 [10]3 years ago
8 0
This is called spyware, so I'd say it would be a Trojan Horse, since those can install without alerting anything really.
STatiana [176]3 years ago
3 0
That would be what is known as Spyware, a common form of this is known as a "Trojan Horse". This type of malware is typically latched on and hidden within files, such as when downloading a pirated version of a song, game, art-work, etc...
You might be interested in
Why might your coworker suggest encrypting an archive file before e-mailing it??
Genrish500 [490]
Because to prevent MITD (Man in the middle is a man that in the middle of the network. For example: You are sending a text, the man in the middle or in the modem will receive the text and can edit it and send it to the receiver, or the man will put the virus in...) and to prevent server snooping
8 0
3 years ago
How do you move a slide to another location in you your<br> presentation?
ludmilkaskok [199]

Answer: Literally click on it and hold, then just drag it to wherever you want it

Explanation: Hope this helped you

5 0
3 years ago
Theresa is a certified teacher. She just had a baby and would like to stay home, but still wants to teach. Which career would be
vesna_86 [32]
I think it will be online classes (B.)
8 0
3 years ago
Read 2 more answers
You are flying an aircraft equipped with an electronic flight display and the air data computer fails. What instrument is affect
Makovka662 [10]

Answer:

cause loss of power, excessive oil consumption, and possible permanent internal engine damage.

Explanation:

4 0
3 years ago
A friend a just opened his own barber shop and has asked you to develop a program to track the type of service the customer is r
True [87]

Answer:

class Barber(object):

   barber_shop = "Big AI's barber shop"

   def __init__(self, customer_name, type_of_service=[], tip=0):

       self.cust_name = customer_name

       self.tos = type_of_service

       self.tip = tip

   def service_type(self, *args):

       for i in args:

           self.tos.append(i)

   def total(self):

       

       services = {'trimming':10, 'hair_cut':20, 'shaving':15, 'washing':5, 'dyeing':5}

       contain = ''

       total = 0

       for service in self.tos:

           if service in services.keys():

               total += services[service]

               contain += f'{service}: {services[service]}\n'

       

       print(self.barber_shop,'\n', self.cust_name,'\n', 'Services:',contain.splitlines(),'\n', \

           f'total: ${total}', '\n',f'Tip: ${self.tip}')

mycust = Barber('John',['washing'],6 )

mycust.service_type('shaving', 'dyeing')

mycust.total()

Explanation:

The Barber class is a blueprint used to create an object instance of customers that visits the barber-shop. It has two methods 'service_type' and 'total' which are just defined functions of the class that appends services to the type of service variable and total that prints the total cost of services on the screen.

4 0
3 years ago
Other questions:
  • If we recorded the average U.S. Housing Price every month for the next year, what graphical display is most appropriate to displ
    6·1 answer
  • Which file types have .exe and .png as their extensions?
    8·1 answer
  • Who wants to play nba 2k20 ps4
    5·2 answers
  • What specific authentication method has no encryption for user credentials or data, and is not recommended for most applications
    14·1 answer
  • Secure shell (SSH) operates over which port by default
    9·1 answer
  • When you use information hiding by selecting which properties and methods of a class to make public, you are assured that your d
    14·1 answer
  • Guyssss......urgent helppp plsss answerrrr
    5·1 answer
  • Write 10 sentences of your own and underline the verb.
    11·1 answer
  • Does anyone know how to by pass this pls help?
    13·1 answer
  • What are two best practices for creating ads? (Choose two.) Select All Correct Responses Implement one ad per ad group per keywo
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!