1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andre [41]
3 years ago
10

A program has been placed on your smartphone without your knowledge and it is collecting personal information about you. What ki

nd of application is this?
Computers and Technology
1 answer:
Llana [10]3 years ago
3 0

Answer:

spyware

Explanation:

In computer security, the term spyware  refers to a form of malware (A malicious program) that "spies", when it is found on a user's device it covertly obtains and gathers information about the individual or the company or organization from the devices hard drive. The information gathered can then be trasmitted and used to perpetrate cyber attacks against the individual or organization.

You might be interested in
Americans overwhelmingly support organ and tissue donation.
Simora [160]

This statement would be TRUE


7 0
4 years ago
System software can be described as end-user software and is used to accomplish a variety of tasks.
irina [24]
Your answer is false :)

I hope this helps! :)
8 0
3 years ago
The function of network switch is to _____.
enyata [817]

Answer:Its C.

Explanation:

3 0
3 years ago
The use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmission
enyata [817]

Answer:

a) true.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

On the other hand, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

Digital certificates, smart cards, picture passwords, and biometrics are used to perform an authentication.

<em>Hence, in cybersecurity the use of encryption and authentication protocols is the standard method of countering attempts to alter or insert transmissions. </em>

5 0
3 years ago
Can someone please help me with this pleaseeeee
vladimir1956 [14]

Answer:

The answer of this question is given below into explanation section

Explanation:

answer (a)

I visited the carrerbuilder dot com and search for data entry job. The link of the posting is given below

https://www.careerbuilder.com/jobs?utf8=%E2%9C%93&keywords=data+entry&location=

answer(B)-Requirements of the the job

  • Previous office experience (data entry experience a plus)
  • Proficient with a computer and computer software (Excel knowledge required)
  • Excellent verbal and written communication skills
  • The ability to multi-task and work in a team-oriented environment
  • High School Diploma / G.E.D.
  • Ability to meet background check and drug screening requirements

answer(C)-Tasks of the job

  • Open, sort, and scan documents
  • Track all incoming supplies and samples
  • Data entry of samples that come in
  • Assist with documentation and maintaining of data
  • Prepare and label information for processing
  • Review and correct any data entry error or missing information

answer (d)

I have 3 years of experience in organization administration where I managed the organization data, generated reports and communicated verbally and written within the organization efficiently.

6 0
3 years ago
Other questions:
  • Which of the following is the best example of a manager with a delegator leadership style
    10·2 answers
  • An essential skill today is knowing how to cite sources properly. Creative Commons has a system of licenses and tools for creato
    11·1 answer
  • The very first thing I should type when creating a formula in excel is:
    15·2 answers
  • Which of the following payment types require you to pay upfront A. Money order and credit card B. Money orders and prepaid card
    9·2 answers
  • Identify the four basic categories of hardware in a microcomputer system. system unit, modem, ram, and microprocessor system uni
    5·1 answer
  • Whats the difference between search engine and web browser?
    6·2 answers
  • Create a class 'ProblemSolution' with following characteristics A public method 'solution' without parameters and return type is
    14·1 answer
  • When Judy logged on the network, she faced the message requesting that she changes her password. So, she changed her password. B
    10·1 answer
  • Genres are useful for many reaseons. What are some explanations you can think of for how genres can be useful to players, game d
    5·1 answer
  • Help me with thissssss
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!