1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viktelen [127]
3 years ago
12

Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?

Computers and Technology
2 answers:
Nadusha1986 [10]3 years ago
8 0
This is called spyware, so I'd say it would be a Trojan Horse, since those can install without alerting anything really.
STatiana [176]3 years ago
3 0
That would be what is known as Spyware, a common form of this is known as a "Trojan Horse". This type of malware is typically latched on and hidden within files, such as when downloading a pirated version of a song, game, art-work, etc...
You might be interested in
Universal Containers has a custom picklist filed with three values on their products. The Admin would like to create a Dynamic B
Agata [3.3K]

Answer:

The Admin should Create a rule with three conditions, each that compares the configuration attribute filed with a static value.

8 0
3 years ago
If you want to change the color of cell which button you click
Elodia [21]

Explanation:

Click alt + H then under the colours pick the colour you want to use a custom colour click more colours and then in the colours dialog box select the colour you want see if that works

7 0
4 years ago
Does virtualization impact the design of programs on behalf of the process/threading model?
zaharov [31]

Answer:

 Virtualization is the process which refers to the isolating the various computing resources that basically run without depend on the particular platform in the environment.

The virtualization basically allow the various application like software and hardware that mainly used to connect different types of server and storage applications.

The virtualization impact while designing the program is that it helps in the program execution process and also reducing the impact by using the hardware virtualization support in the system. The thread system also maintain the virtualization impact while designing.

7 0
4 years ago
Aurelia is designing a user interface for a new game app. Which of the following should she taken into consideration for the use
serious [3.7K]

Answer:

C

Explanation:

what types of loop will be used.

4 0
3 years ago
The process of ensuring that web pages coded with new or advanced techniques still are usable in browsers that do not offer supp
grigory [225]

Answer:

progressive enhancement

Explanation:

Progressive enhancement is a powerful method for web developers when building websites accessible to different level user-agents.

Progressive enhancement technique allows you start with <em>simple</em> and <em>foundational</em> layers and then building more complex technologies on top of it. This principle lets multiple level user-agents can access and retrieve your work no matter what level of technologies they are using.

8 0
3 years ago
Other questions:
  • Can someone text me cuss I'm bored my number is (225) 975 7120
    10·1 answer
  • An iterative algorithm uses a loop to solve the problem, while a recursive algorithm uses a method that calls itself. (true, fal
    7·1 answer
  • Which of the following is not a metamorphic agent?
    8·2 answers
  • When a user inserts a PivotTable, where will it be inserted?
    15·1 answer
  • Which objects with developed to help astronomers to learn more about the sun
    12·1 answer
  • Are scripted languages easier or more difficult to port than programming languages? Why?
    6·1 answer
  • Zack is taking a survey that contains questions about his future plans. Which question would most likely be on the survey?
    9·2 answers
  • What is the difference between packaged and tailored software ​
    13·1 answer
  • Please help ⊙﹏⊙ thank you &lt;3
    10·2 answers
  • 1. The opportunity to create several equations for launching program files is called
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!