1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delicious77 [7]
4 years ago
11

What is the difference between spyware and adware

Computers and Technology
2 answers:
stepladder [879]4 years ago
6 0
Spyware<span> is considered a malicious program and is similar to a Trojan Horse in that users unwittingly install the product when they install something else. ... </span>Spyware <span>works like </span>adware<span> but is usually a separate program that is installed unknowingly when you install another freeware type program or application.</span>
fgiga [73]4 years ago
6 0
Unlike spyware, adware does not perform malicious acts.<span>Windows Defender helps protect you from </span>spyware<span>, but it's crucial that you also have antivirus software to help protect you against </span>viruses<span>. 

</span>
You might be interested in
Keyboard shortcut could you use instead of clicking the icon
Brums [2.3K]
I don't know which icon your talking about, but I would say the tab button is the answer you are looking for. 
8 0
3 years ago
The process of identifying and removing logical errors and runtime errors is called ..............
9966 [12]
The process of finding and eliminating errors is called debugging.

Hope that helps
VexPlayz
6 0
3 years ago
Read 2 more answers
Hw to gain more knowledge ​
LenaWriter [7]

Answer:

Read Books, Search the Internet, etc...

Explanation:

6 0
3 years ago
What should I change my fortnite name to:<br> Barneys broken thumb or I dont have aim assist
Ket [755]

Answer: yes

Explanation:

4 0
3 years ago
They are correct? thank you!
vredina [299]

Answer:

<em>Yes</em><em> </em><em>they</em><em> </em><em>are</em><em> </em><em>correct</em><em>.</em><em> </em><em>welcome</em><em>.</em><em>.</em><em>.</em><em>.</em>

8 0
3 years ago
Other questions:
  • What is TCP/IP's Transport layer's primary duty?
    8·1 answer
  • Consider that an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker breaks in
    5·1 answer
  • How do you guys feel about the coronavirus and being Homeschooled
    10·1 answer
  • If you were looking for a record in a very large database and you knew the ID number, which of the following would be the most d
    6·1 answer
  • What was the first video game ever invented
    11·2 answers
  • Used for monitoring web activity by users to make sure that sensitive information won't leave the building.
    7·1 answer
  • For each situation, provide a pseudocoded algorithm that would accomplish the task. Make sure to indent where appropriate.Situat
    10·1 answer
  • An individual involved with the aspect of a project will be concerned with budgets and the costs associated with running a busin
    10·2 answers
  • Gavin is making a new logo for his business. He uses drawing software to create a unique. Which file format does he use to creat
    5·1 answer
  • Which of the following is the key business objective behind the technologies implemented by PCL Construction, as discussed in th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!