1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
3 years ago
7

Keystroke loggers are stealth software packages that are used to monitor keyboard activities. Which is the best location to plac

e such keyloggers?
Keyboard hardware and the operating system
UPS and keyboard
Operating system and UPS
Monitor and keyboard software
Computers and Technology
1 answer:
irina [24]3 years ago
7 0

Answer: Keyboard hardware & the operating system

Explanation:Keystroke loggers is also referred as the monitoring system which is a for the inspection of the every key pressed on an operating system. This technology monitors the activities of keypad devices such as smart phones etc. It is also used for the surveillance of the unauthorized activities that are done by the hackers or criminals.

Thus the correct option is keyboard hardware and the operating system is the location of the placement of the key loggers.

You might be interested in
Why did industrial revolution begin Britain?​
allochka39001 [22]

Answer:

Britain also happened to have a wealth of coal, iron, and other resources in a relatively small area, which would help kick-start the Industrial Revolution. Its growing Colonial Empire also provided a ready-made (and captive) market for surplus goods, providing further impetus for entrepreneurs and new industrialists

7 0
1 year ago
Read 2 more answers
One interesting application of computers is to display graphs and bar charts. Write an application that reads five numbers betwe
Nezavi [6.7K]

Answer:

The answer to this question can be given by program that  are as follows

import java.util.*;

//import package for taking input from user.

public class Main   //define class

{

public static void main (String ag[] )   //define main function

{

 int number;

 Scanner input = new Scanner(System.in);

 for (int i = 0; i < 5; i ++)                       //loo for input.

 {

  System.out.print ("Enter a number between 1 - 30:  ");

  number = input.nextInt();          //input number by the user.

 

 }

 asterisk();           //calling function.

 }

public static void asterisk()          //defination of function.

{

    //body of function.

    int n;                   //local variable.

 for (n= 0; n <= 30; n++)                  //using loop for print asterisk

 {

 if (n !=0)

 //printf used for print value.

 System.out.printf("*", n );                  //print value.

 }

 

  for (n= 0; n <= 30; n++)         //using loop for print asterisk

  {

 if (n !=0)

 //printf used for print value.

 System.out.printf("*", n );     //print value.

 }

 

  for (n= 0; n <= 30; n++)          //using loop for print asterisk

  {

 if (n !=0)

 //printf used for print value.

 System.out.printf("*", n );          //print value.

 }

  for (n= 0; n <= 30; n++)            //using loop for print asterisk

 

 {

 if (n !=0)

 //printf used for print value.

 System.out.printf("*", n );               //print value.

 }

 

  for (n= 0; n <= 30; n++)             //using loop for print asterisk

  {

 if (n !=0)

 //printf used for print value.

 System.out.printf("*", n );             //print value.

 }

}

}

Output:

Enter a number between 1 - 30: 2

Enter a number between 1 - 30: 2

Enter a number between 1 - 30: 1  

Enter a number between 1 - 30: 3

Enter a number between 1 - 30: 4

*******************************************************************************

Explanation:

In this program we take 5 time input from the user and print the value in the form of (*) that can be explain in above output section.In that program we use printf method that is also used for print the value.

3 0
3 years ago
Jim has excellent oral and written communication skills. He enjoys public speaking and wants a job in which he will interact wit
fredd [130]
The best job for Jim would be public relations specialist.
7 0
3 years ago
Read 2 more answers
Which of the following is a valid byte?<br><br> 11100<br> 11011011<br> 00000000<br> 10022011
SVETLANKA909090 [29]

Answer:

11011011

00000000

Explanation:

10022011 cant be an answer because bits are composed of 0s and 1s

and 11100 is too small.

3 0
2 years ago
Grade 10 python exercise
lbvjy [14]

number = 547

nums = {1:"one", 2:"two",3:"three",4:"four",5:"five",6:"six",7:"seven",8:"eight",9:"nine"}

print("The last digit of",number,"is",nums[number%10])

I wrote my code in python 3.8. I hope this helps.

7 0
3 years ago
Other questions:
  • ​A(n) ____ statement can include rules for site visitors, a statement of copyright in the site design and content, and can restr
    12·1 answer
  • A(n ________ is a program that is used to create, process, and administer a collection of self-describing integrated records.
    14·1 answer
  • 5. The hazardous component in most antifreeze is _____, which is extremely toxic to humans and animals. A) Calcium Carbonate B)
    13·2 answers
  • Rest or take a break every __ minutes when typing. Please help!
    5·2 answers
  • The ___________ button represents the start of a hyperlink in Table of contents.
    7·1 answer
  • What percent of the internet is the deep web?
    14·1 answer
  • Systems Software, Inc., is introducing a new piece of sophisticated graphics software. A recently hired writer has been assigned
    8·1 answer
  • I can't get my screen to scroll down when answering questions in brainly. Help?
    13·1 answer
  • The science of networking is attributed to which government's involvement?
    11·1 answer
  • and assuming main memory is initially unloaded, show the page faulting behavior using the following page replacement policies. h
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!