1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Papessa [141]
3 years ago
14

__________ is software that comes hidden in free downloadable software that tracks online movements, mines the information store

d on a computer, or uses a computer's CPU and storage for some task the user know nothing about.
Computers and Technology
1 answer:
denis23 [38]3 years ago
7 0

Answer:

Spyware

Explanation:

Spyware is the software which is used to track the online movements, it also track the user action on the computer they are also called sneakware  or stealthware

  • This software is used  in the business purpose which it may be used in the office to track the record of employee in the working hours .
  • Spyware  software is used to track the information without knowing the user.

 

You might be interested in
Use the Wrap Text icon to _____. modify which graphic appears in the front of layered images modify the picture effects change t
sergey [27]

I believe it's change the way text is wrapped around an object.

3 0
3 years ago
Read 2 more answers
Which of these practices should you follow while creating your resume?
avanturin [10]

B is better than any other one's I think.

8 0
3 years ago
Read 2 more answers
The programming language that translates digital data into printer commands is known as
jolli1 [7]
The answer is C.) PostScript
8 0
3 years ago
During an engine's intake stage, what passages inside the cylinder head of a gasoline powered engine must the incoming air-and-f
kow [346]
The intake ports must be open to allow fuel and oxygen to enter cylinder, then closes during compression. Your answer is A.
3 0
3 years ago
Which of the following is a bullet type in the <ul> tag?
dybincka [34]

Answer:

That would be (d) All of these. I hope this helps you!

8 0
3 years ago
Other questions:
  • why do programs include keyboard shortcuts for certain actions? do you prefer the mouse or the keyboard/ why?
    7·1 answer
  • A process that allows software-based networked computers to run multiple operating systems and programs and share storage is cal
    5·1 answer
  • Individuals and businesses have concerns about data security while using Internet-based applications. Which security risk refers
    13·1 answer
  • To execute a prepared SQL statement, you can use the ________________ and execute() methods of the PDOStatement object to set pa
    10·1 answer
  • Managers looking for advice on properly dealing with obsolete technology hardware can: a) consult the e-Stewards program b) seek
    9·1 answer
  • 2. A shift register can operate:
    10·1 answer
  • Translate the following C program into an assembly program. The C program finds the minimal value of three signed integers. Assu
    13·1 answer
  • Plssssssssssssss help quick
    8·1 answer
  • bro i got banned for posting an amazing bulk pic, but this dude literally posted an inappropriate, dafuq is wrong with this bann
    8·2 answers
  • DERECTIONS: Identify all the computer software that you need for the following entrepreneurial activities. Refer your answer fro
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!