1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
3 years ago
7

Keystroke loggers are stealth software packages that are used to monitor keyboard activities. Which is the best location to plac

e such keyloggers?
Keyboard hardware and the operating system
UPS and keyboard
Operating system and UPS
Monitor and keyboard software
Computers and Technology
1 answer:
irina [24]3 years ago
7 0

Answer: Keyboard hardware & the operating system

Explanation:Keystroke loggers is also referred as the monitoring system which is a for the inspection of the every key pressed on an operating system. This technology monitors the activities of keypad devices such as smart phones etc. It is also used for the surveillance of the unauthorized activities that are done by the hackers or criminals.

Thus the correct option is keyboard hardware and the operating system is the location of the placement of the key loggers.

You might be interested in
Suppose there are 10 computers on a network that are configured to share a few printers and a single document folder. The compan
ivanzaharov [21]

Answer:

B- Workgroup model

Explanation:

A workgroup model can be defined as a process which enables system to be peer together in order to access the resources shared like files and printers at the same time.

In work group microsoft operating systems tend to share files, printers, and even Internet connection among them which is why work group is important especially in a place in which their are various computers with limited files and printer or internet connection.

4 0
3 years ago
________ is the process of inspecting data that has been input to a program to make sure it is valid before using it in a comput
Mumz [18]

Answer:

Hence, <u>Input Validation</u> is the process of inspecting data that has been input to a program to make sure it is valid before using it in a computation.

Explanation:

The input should be validated before further processing to avoid problems in execution of program afterwards.

The process of input validation is defined to make sure that the input is valid.

Hence, <u>Input Validation</u> is the process of inspecting data that has been input to a program to make sure it is valid before using it in a computation ..

3 0
3 years ago
What is the name of an instruction that interrupts a program being executed and requests a service from the operating system
tresset_1 [31]
“Interrupt” is what I think the answer is
7 0
2 years ago
You need to give mary only the rights that she needs. This must be accomplished with the least amount of administrative effort
Arte-miy333 [17]

Answer:

Management is not that easy. And at each level of the work environment, we need it. Suppose Mary works under an editor, and as a writer. Then She will be provided by editor a certain set of rights, that she requires to accomplish her work. And the chief editor who heads the editor, and who might be the administrator has nothing to do with this. And thus this will ensure that the chief editor or the administrator can accomplish other works during this time. And this will certainly save time, of the whole team. And its a rule in management, that only those rights are provided, that are required by the worker, and like in case of Mary.

Explanation:

Please check the answer section.

7 0
3 years ago
Which formula is used to measure accuracy?
Westkost [7]

Answer:You can only find REaccuracy if you know the actual “true” measurement… something that's difficult to do unless you're measuring against the atomic clock. The formula is: REaccuracy = (Absolute error / “True” value) * 100%.

Explanation:

7 0
3 years ago
Other questions:
  • (tco 8) when a file is opened in the append mode, the file pointer is positioned
    8·1 answer
  • I need a idea of a origami for my coding class and it needs to be easy to make
    15·2 answers
  • If a pedestrian begins to cross my path when i have the right of way
    5·1 answer
  • Which is an advantage that electronic scheduling tools have over paper calendars?
    13·2 answers
  • What is a network of high-capacity communication links is the internet?
    8·1 answer
  • One of your professors has asked you to write a program to grade her midterm exams, which consist of only 20 multiple-choice que
    15·1 answer
  • Use the Law of Sines to solve the triangle. Round your answers to two decimal places.
    6·1 answer
  • Identify the benefit of modeling to communicate a solution.
    10·1 answer
  • Name:
    11·1 answer
  • How do cyber criminals target user’s end devices?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!