1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
3 years ago
12

Any malware software that covertly gathers user information without the user s knowledge, is known as ______ .

Computers and Technology
1 answer:
shusha [124]3 years ago
3 0
It be known as spyware
You might be interested in
Which of the following file formats allows you to share and save documents
mariarad [96]
OPTION A would be the answer
7 0
2 years ago
The general syntax to overload the stream extraction operator >> for a class is ____.
Aloiza [94]
Istream& operator>> (istream& input, Example& example)
{
// Extract your data from input stream here
return input;
}
5 0
3 years ago
Carl is a music teacher. He builds custom computer systems for his students to use when they are learning and creating music. Ca
shutvik [7]

Answer:

um ahh <em> </em><em>badl</em><em>y</em><em> </em>

Explanation:

i really don't know the answer

4 0
2 years ago
_______ software helps run the computer and coordinates instructions between other software and the hardware devices. select one
Mila [183]
'SYSTEM' <span> software helps run the computer and coordinates instructions between other software and the hardware devices.</span>
5 0
3 years ago
What should you keep in mind when adding contents to your digital portfolio?
sveticcg [70]

Answer:

The contents of the portfolio will depend on individual education, work experience and future goals

Explanation:

The contents of the portfolio will depend on the following -

a) Work biography/experiences

b) Career goals

c) personal details

d) contact information

e) Professional photograph

f) Relevant skills

g) Relevant documents, certificates, degree etc.

etc.

4 0
3 years ago
Other questions:
  • Which of the following are characteristics of a good webmail message select all that apply
    14·1 answer
  • What is used for World Wide Web?
    7·1 answer
  • Explain the function of the Ribbon in Microsoft Word.
    15·1 answer
  • Create an Entity-Relationship Diagram with the following requirements.
    6·1 answer
  • In 1971, Intel created and marketed the first microprocessor chip, called the Intel 4004. What was significant about this invent
    7·1 answer
  • The model for Diminishing Marginal Utility is ______ in nature.
    12·1 answer
  • F he continues to make monthly payments of $100, and makes no new purchases, how many more payments will he have to make before
    13·1 answer
  • Compared with traditional methods, the entire rapid application development (RAD) process is expanded and, as a result, the new
    11·1 answer
  • Ethernet and wireless networks have some similarities and some differences. One property of Ethernet is that only one frame at a
    15·1 answer
  • If I want to make it look like slide number one is turning a page to slide number two, what
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!