1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
3 years ago
7

Keystroke loggers are stealth software packages that are used to monitor keyboard activities. Which is the best location to plac

e such keyloggers?
Keyboard hardware and the operating system
UPS and keyboard
Operating system and UPS
Monitor and keyboard software
Computers and Technology
1 answer:
irina [24]3 years ago
7 0

Answer: Keyboard hardware & the operating system

Explanation:Keystroke loggers is also referred as the monitoring system which is a for the inspection of the every key pressed on an operating system. This technology monitors the activities of keypad devices such as smart phones etc. It is also used for the surveillance of the unauthorized activities that are done by the hackers or criminals.

Thus the correct option is keyboard hardware and the operating system is the location of the placement of the key loggers.

You might be interested in
Which mechanical switches are the loudest and clickiest?
telo118 [61]

Answer:

1.Cherry MX Blue

2.most expensive is Gateron Blue

3 0
3 years ago
What type of memory speeds up the action performed by the computer and anticipates instructions?
kherson [118]
A cache memory is a small piece of memory that can be accessed very fast. It keeps copies of data that is used often. For example, by keeping data read from a database in memory, the second time the data is needed, it can be taken from the cache in stead of a lengthy query in the database.

Caches can be found in hardware (ie., on the cpu itself), but also as a programming concept in software.
4 0
3 years ago
The computer mouse is used to
Alexandra [31]
Is there options to this question?
7 0
3 years ago
True / False
Tju [1.3M]

Answer:

TRUE, The PC is always incremented by the same amount in fixed-length instruction set architectures.

Explanation:

Its TRUE that Program Counter ( PC ) is always incremented by the same amount in fixed - length instruction set architectures ( fixed length ISA) . As the instruction set length is fixed in fixed - length instruction set architectures, the Program Counter to fetch the next instruction set it has to be incremented by fixed length. This fixed length depends on the hardware of the architecture (the number of bytes each machine word contains and number of machine words per memory location)

7 0
4 years ago
. Briefly describe an SQL DML statement for storing new data into a table.
STatiana [176]

DML stands for Data Manipulation Language.

SQL DML statements consist of insert, update and delete statements.

Out of these three, insert is used to add new data to the table.

The update command modifies the existing data in the given table.

The delete command removes the data from the given table.

Syntax

INSERT INTO table_name ( column1, column2, …….. )

VALUES ( value1, value2, ……… )

The table_name represents the table in which data is to be inserted.

All the columns in the table_name need to be specified in the brackets in the insert into clause.

All the values in the values clause should correspond to the columns, both in the order in which the columns are mentioned and the data type of the values should match the respective column.

Example

Consider the table Person consisting of columns id, name, gender having data type integer, varchar and varchar, respectively.

In order to add data to all the columns of the Person table, the command is as follows.

Insert into Person ( id, name, gender )

Values ( 101, “Alexis”, “Male” );

In the above command, value is present for each column in the respective order. Also, the format of the data match the format of the columns.

Other versions of the insert command add data only to some columns in the table.

Insert into Person ( id, name )

Values ( 102, “Aayesha” );

The above command adds data only to two columns as mentioned.

Also, null value can be added using insert command.

Insert into Person ( id, name, gender )

Values ( 103, “Brainly dot com”, null );

Since null value appears at number three, the corresponding column to this value is also number three, i.e., gender column.

This inserts null value as the gender for Brainly dot com.

3 0
3 years ago
Other questions:
  • Randy is concerned about his company’s data security on the Internet. Because cellular signals are not encrypted, he is concerne
    6·1 answer
  • You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will
    12·1 answer
  • Does the following program represent an algorithm in the strict sense? Why or why not? Count=0 while count (count ! =5): count =
    13·1 answer
  • ___________ is a task pane used to correct grammar errors; opens when you click the Spelling & Grammar button in the Proofin
    15·2 answers
  • Your computer has been showing signs of a malware infection, and today it started up in Safe Mode. Because your computer is not
    6·1 answer
  • Someone please help will mark as brainliest
    8·2 answers
  • What is the output of the first and second print statements?
    13·1 answer
  • The ____ contains app buttons that allow you to quickly run the File Explorer or Microsoft Edge apps.
    12·1 answer
  • Difference between hardcopy and hardware​
    6·1 answer
  • Write a function that receives a one-dimensional array of integers and returns a Python tuple with two values - the minimum and
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!