1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andre [41]
3 years ago
10

A program has been placed on your smartphone without your knowledge and it is collecting personal information about you. What ki

nd of application is this?
Computers and Technology
1 answer:
Llana [10]3 years ago
3 0

Answer:

spyware

Explanation:

In computer security, the term spyware  refers to a form of malware (A malicious program) that "spies", when it is found on a user's device it covertly obtains and gathers information about the individual or the company or organization from the devices hard drive. The information gathered can then be trasmitted and used to perpetrate cyber attacks against the individual or organization.

You might be interested in
In the past, data was transferred from OTLP databases to data warehouses periodically, say once a month or even once a week. Now
Vinvika [58]

Answer:

Active is the correct answer of this question.

Explanation:

In active database is a database that contains a tournament-driven infrastructure that can adjust to circumstances within the database and beyond. Alternate  include safety tracking, contacting, collecting and approving information.A move is towards active or real-time data storage so that applications can evaluate and help decision making use of current data.

3 0
4 years ago
Write an interactive program to calculate the volume and surface area of a three-dimensional object
Sveta_85 [38]

Answer in Python:

<em># Define program constants</em>

PI = 3.14

<em># Welcome the user to our program</em>

print("### Welcome to the Sphere Volume Calculator")

<em># Ask for the Radius (r) input and store it as a float</em>

radius = float(input("Type the Radius of your sphere in meters: "))

<em># Calculate the volume</em>

volume = 4 / 3 * PI * radius ** 3

<em># Print the result</em>

print("Your sphere volume is:", volume, "m³")

References:

  • https://www.w3schools.com/python/python_variables.asp
  • https://www.w3schools.com/python/python_casting.asp
  • https://www.w3schools.com/python/python_user_input.asp
  • https://www.w3schools.com/python/python_operators.asp
  • https://www.w3schools.com/python/ref_func_print.asp
5 0
3 years ago
Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. do you agree wit
lutik1710 [3]
 "Hackers" who work for companies to expose security flaws are definitely good, they're helping protect systems, often referred to as "white-hat" hackers. Many companies hire people like these or offer bounties for such people who can find vulnerabilities. One could say that even without permission, people who hack with the intent of demonstrating holes in security or improving a service could be considered good.

However, I don't believe that as firstly, they are breaking the law, and secondly, they are stealing data and invading people's privacy. One might as well break into somebody's house to say their security is bad! 


7 0
3 years ago
Intel Centrino Technology is the combinatin of wirelesstechnology with the previous HT technology.
Kay [80]

Answer:

<u>False</u>

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

The Intel Centrino Technology is a product marketed and sold by the tech giant Intel, which offers a combination of their Wi-Fi and WiMax technologies in a single personal laptop. It does not offer Hyper threading Technology (HT) like some of the other Intel branded CPU's. Some of the CPU's that include hyper threading are the Core I3 series.

Therefore, based on the information stated above, we can see that the statement in the question in <u>False</u>.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

7 0
3 years ago
If you tap or click the increase font size button too many times and make the font size too big, you can tap or click the _____
ioda
You can click the ctrl and minus  button at the same time
7 0
4 years ago
Other questions:
  • According to the text, what have humans used throughout history to overcome physical limits?
    12·1 answer
  • Describe network in terms of the class computer lab
    14·1 answer
  • What type of socket should be used with an air impact wrench
    12·1 answer
  • Application programmers specialize in developing system software such as operating systems, device drivers, security modules, an
    10·1 answer
  • How to program chamberlain universal garage door opener?
    13·1 answer
  • Try of false using a combination of alt and a key underlined in the command you want is a short cut?
    6·1 answer
  • 1i) Standardize 'weight' column Write a function named standardize_weight that takes in as input a string and returns an integer
    14·1 answer
  • Select three areas that should be included in a contract consultant’s business expense model.
    11·1 answer
  • Why RAM is necessary in a computer​
    9·1 answer
  • Shouldn't I be virtuoso? I keep refreshing and opening and closing tabs but it still hasn't updated
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!