1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leto [7]
3 years ago
15

Which term is used to describe a software application that is secretly placed on a user system to gather information and relay i

t to outside parties usually for advertising purposes?
Computers and Technology
1 answer:
BARSIC [14]3 years ago
6 0

Answer: Spyware?

Explanation:

You might be interested in
What is a office buttom?
SpyIntel [72]
The Microsoft button was exclusively used in the 2007 versions of word, excel, powerpoint, access and outlook. It has all of the different options like to save, print, open ect. It was located in the top left hand corner of the screen. It looked a bit like this (see attachment).

3 0
3 years ago
A company wants to publish Knowledge articles to its Customer Community. The articles should be organized for easy navigation by
olchik [2.2K]

Answer:

Define Topics for each Knowledge article

Explanation:

Knowledge article has been written about the services or products that a company offers. It is the information related to some particular product or service. The information contain the knowledge about products, ingredients, how to use the product etc.

To provide this information to the community members, a consultant recommend that, define topic for each knowledge article. So that, a particular person can find this information by searching through topic name.

5 0
3 years ago
When inserting a fly in animation what is the first step in the process?
marishachu [46]

Answer:

The answer: select the element you wish to animate.

Explanation:

4 0
3 years ago
Please help <br> what do data communications transmit data through?
I am Lyosha [343]

Answer:There are two methods used to transmit data between digital devices: serial transmission and parallel transmission. Serial data transmission sends data bits one after another over a single channel. Parallel data transmission sends multiple data bits at the same time over multiple channels.

Explanation:

5 0
3 years ago
You are asked to develop a cash register for a fruit shop that sells oranges and apples. The program will first ask the number o
vaieri [72.5K]

Answer:

customers = int(input("How many customers? "))

for i in range(customers):

   name = input("Name of Customer " + str(i+1) + " ")

   

   print("Oranges are $1.40 each.")

   oranges = int(input("How many Oranges? "))

   

   print("Apples are $.75 each.")

   apples = int(input("How many Apples? "))

   

   bill = oranges * 1.4 + apples * 0.75

   

   print(name + ", you bought " + str(oranges) + " Orange(s) and " + str(apples) + " Apple(s). Your bill is $%.1f" % bill)

Explanation:

*The code is in Python.

Ask the user to enter the number of customers

Create a for loop that iterates for each customer. Inside the loop, ask the user to enter the name, number of oranges, number of apples. Calculate the bill. Print the name, number of oranges, number of apples bought and total bill

5 0
3 years ago
Other questions:
  • When does a kernel panic occur?
    12·2 answers
  • The init() command initializes the task queue and scheduler data structures. run Next Task() MUST run to completion whatever tas
    9·1 answer
  • How is the execution speed of machine language compared to that of high-level languages? The execution speed of machine language
    10·2 answers
  • Default tab stops are set in word every _______ inch.<br> a. ¼<br> b. ¾<br> c. ½<br> d. 1
    15·1 answer
  • Free brainliest!?! &lt;3​
    9·2 answers
  • Who innovated an aeroplane? ​
    5·1 answer
  • Brainly is brainly am I correct ​
    11·2 answers
  • How does computer number system play a Vital role in a computer calculation. ​
    8·1 answer
  • mary has access to certain resources because she is in the Research division of her company. She has access to other resources b
    15·1 answer
  • Cybersecurity breaches in the workplace generally happen because _____. Select 3 options. people deliberately try to hack into t
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!