1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viktelen [127]
3 years ago
12

Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?

Computers and Technology
2 answers:
Nadusha1986 [10]3 years ago
8 0
This is called spyware, so I'd say it would be a Trojan Horse, since those can install without alerting anything really.
STatiana [176]3 years ago
3 0
That would be what is known as Spyware, a common form of this is known as a "Trojan Horse". This type of malware is typically latched on and hidden within files, such as when downloading a pirated version of a song, game, art-work, etc...
You might be interested in
Drag each storage device to its category.
alexandr402 [8]

ROM: Secondary

HDD: Primary

RAM: Primary

DVD: Secondary

3 0
3 years ago
1. Why is it important to compare features of a computer before making a purchase?
Ede4ka [16]
1. Because you can get the same features for a better price
2. CPU, GPU, RAM, Storage, OS, etc.
7 0
3 years ago
Read 2 more answers
________models software in terms similar to those that people use to describe real- world objects.
mr_godi [17]

Answer:

The correct answer is C - Object-oriented design.

Explanation:

Object-oriented design defines code or software as objects. These objects represent instances of a real-life situation. For example, an animal class consist of a dog, cat, lion. A dog therefore is n instance of the animal class.

Objects are described as having properties and behaviours. Properties are variables, arrays, sets, maps etc and behaviours are the functions and methods that manipulate these data.

Object-oriented programming is done based on this design.

7 0
3 years ago
What is the way to discover requirments for software projects ?
Sav [38]

Learn about requirement analysis by knowing how to identify business requirements and software requirements with ... Here are the objectives for performing requirement analysis in the early stage of a software project:.

6 0
2 years ago
When microsoft introduced its zune mp3 player, many people thought it would capture the mp3 player market by pricing its product
SSSSS [86.1K]
Your answer would be:  P<span>redatory Pricing .</span>
8 0
3 years ago
Other questions:
  • The ______ identifies the path for the currently open folder
    8·2 answers
  • What is the last step in conducting url search
    11·1 answer
  • Suppose you find a magic $1.00 coin. Its magic power is as follows: as each day passes, you get an additional dollar plus half o
    6·1 answer
  • I have a problem with importing excel file into Access. I have some table in Excel and I want to import it into Access. When I d
    6·2 answers
  • You've been asked to find the largest number in a range of numbers. Which of the following could you use to find the largest num
    8·1 answer
  • A vertical curve means that any change in the Aggregate Price Level will have what result?
    15·1 answer
  • Create the Following Menu in a loop so the menu will continually show until the user chooses to exit.AddMultiplyExitAdd a value
    10·1 answer
  • With ____________________, you can insert and remove a device while the computer is running.
    11·1 answer
  • 1. Implement the function dict_intersect, which takes two dictionaries as parameters d1 and d2, and returns a new dictionary whi
    8·1 answer
  • 9. Which of the following is considered an interface? (1 point)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!