1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lostsunrise [7]
3 years ago
11

What is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet a

dvertisers to display advertisements without the consent of the computer user?
Computers and Technology
1 answer:
AveGali [126]3 years ago
3 0

Answer:

Adware is the correct answer to the given question.

Explanation:

Adware is a type of software that turns a profit for its creator by creating online advertising in the software's user interface automatically. The Adware  giving the advertisement in the website or in the web page. There are two different ways in which Adware is going on the computer  

1 Malicious website    

2 Shareware.

Adware software is used to purporting to serve some useful function adware software display the advertisements without the consent of the computer user or machine.

You might be interested in
Which of the following declares an abstract method in an abstract Java class?
slava [35]

The option that declares an abstract method in an abstract Java class is  option(B.) public abstract void method().

<h3>In Java, are abstract methods compatible with abstract classes?</h3>

Class and method abstraction is when Objects cannot be created using the abstract class, which is a restricted class. In addition to not having a body, an abstract method is only applicable to abstract classes. Subclasses provide the body.

Hence, consists of only the method definition and not any implementation. An Abstract Method is a method that doesn't have a body. A class that is abstract must declare it. Due to the need for the abstract class to implement each abstract method, the abstract method can never be considered final.

Learn more about abstract method from

brainly.com/question/15684705
#SPJ1

8 0
1 year ago
ou and a friend decide to watch a movie on your computer. The movie is saved on a second hard drive on your system. When you are
goldenfox [79]

Answer: Virus attack or hard drive crash.

Explanation: In the event of this happening there are two possible things that has likely happened.

Virus Attack : There might have been a virus attack on the device.

Hard drive failure or crashing: The hard drive has failed or crashed.

Solution: You can try to reformat the system to handle any case of possible virus. Also ensure you check your hard drive too.

8 0
3 years ago
Your help will help me understand my answers by comparing to yours. Your kind contribution is very much appreciated.
OLEGan [10]
4. B
for # 5 what illustration are u talking about
6. D
7. D
8. don't understand that question

sorry these questions might be wrong

6 0
3 years ago
What are two examples of ways an electronic record may be distributed to others?
Karolina [17]

Answer:

Way 1. Email, Way 2. Publish on Internet

Explanation:

8 0
3 years ago
We have a user Sally Smith who we want to grant the ability to launch applications and browse folders. But we do not want her to
igomit [66]

Answer:

LIST

Explanation:

NTFS is A proprietary journaling file system developed by Microsoft. It started with windows 3.1.

List Folder Contents: Is what Gives authorized user the permission to viewing and listing of files and sub-folders as well as executing of files inherited by folders only.

NTFS permissions applies to every file and folder stored on a volume formatted with the NTFS file system. By default, permissions are inherited from a root folder to the files and sub-folders beneath it, although this inheritance can be disabled.

List Folder Contents will allow you to display the folder's contents and to display the data, attributes, owner, and permissions for files within the folder.

The NTFS permission that applies to the Domain Users group that will allow Sally to do what he wants without allowing more access than necessary is LIST.

8 0
3 years ago
Other questions:
  • Problem 1: Create a list that contains the months of the year. Problem 2: Create a loop to print the month number and name (do n
    7·1 answer
  • What is Administrator windows 10
    8·1 answer
  • The practice of using similar but not identical domain names is called _____. domain spoofing domain masquerading domain tasting
    13·1 answer
  • Which of these would NOT be a valid Internet Control Message Protocol (ICMP) error message:
    6·1 answer
  • You can minimize the Ribbon with a command contained on the _____.
    7·1 answer
  • Your company is a small start-up that has leased office space in a building shared by other businesses. All businesses share a c
    6·1 answer
  • What is a hardware device that allows you to connect to several computers and other devices to a single internet connection
    6·1 answer
  • Define the terms network, LAN, WAN, and Internet.
    11·1 answer
  • What happens when you restrict someone on messenger?.
    12·1 answer
  • Consider a game that is searched using random restart hill climbing strategy. Assume that the success rate for the game is 25%.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!