1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
4 years ago
7

Ann, a user, states that her machine has been behaving erratically over the past week. She has experienced slowness and input la

g and found text files that appear to contain pieces of her emails or online conversations with coworkers. The technician runs a standard virus scan but detects nothing.
Which of the following types of malware has infected the machine?
A. Ransomware
B. Rootkit
C. Backdoor
D. Keylogger
Computers and Technology
1 answer:
tiny-mole [99]4 years ago
6 0

Answer:

Option D i.e., Keylogger is the correct option.

Explanation:

It is also known as the keystroke logger, which is an application used to logs or follow the keys of the struck on the users keyboard.

So, while the machine of the user acting like unsystematic manner and the user has encountered sluggishness and latency in feedback and they found txt files that seem to hold bits of some messages or interactions with colleagues online.

Then, the technician has to be execute a software that is Keylogger to detect a problem because the the following malware is the keylogger malware.

You might be interested in
What is a high level language?​
vovikov84 [41]

Answer:

a high level language is any programming language that enables development of a program in a much more user friendly programming context and is generally independent of the computers hardware architecture.

8 0
3 years ago
Read 2 more answers
Why is self-esteem important in self-representation
german
Hello! Self-esteem is important in self-representation, because the way you feel yourself can affect how you represent yourself as well. For example, if you have low self-esteem, you may present yourself as sad and shameful. However, if you have high self-esteem, you present confidence and happiness to other people.
3 0
4 years ago
Need help with understanding Project Reactor<br><br> https://projectreactor.io/
ddd [48]

Answer:

IT IS LIKE A ONILE AND THE PERFECT

Explanation:

THIS IS YOUR ANSWER

I HAVE EXPLAINED YOU

8 0
3 years ago
Jerry keeps a spreadsheet of all the tools he owns. He wants to figure out
Evgen [1.6K]

Answer:

It's B and C

Explanation:

As because first you have to write the formula in any cell like to write the total if u want to to write in negative than it's B and If u want in positive than it's C. And see the above pictures to get it perfectly

7 0
3 years ago
Read 2 more answers
Most of the Desktop games contain a backdoor used to test and update the game.
sveta [45]

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer" —a tiny computer-within-a-computer such as that found in Intel's AMT technology).Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems. From there it may be used to gain access to privileged information like passwords, corrupt or delete data on hard drives, or transfer information within autoschediastic networks.

the answer is True

i hope it will help you

8 0
3 years ago
Other questions:
  • Discuss 2D gameplay and how new platforms such as cell phones are taking advantages of this renewed market
    5·1 answer
  • When should you check to see that fuel lines, connections, and fuel vents are in good condition?
    7·1 answer
  • Web maintenance plays a vital role in a website's development. It helps ensure the online presence of any website by performing
    8·1 answer
  • Which function should be used to display a value based on a comparison?
    15·2 answers
  • The * key on the number keypad is used for _____.
    5·2 answers
  • Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit
    7·1 answer
  • Which of the following Web sites would be MOST credible?
    6·1 answer
  • What color and hat do you choose in Among Us
    15·1 answer
  • ) Write a program to calculate the time to run 5 miles, 10 miles, half marathon, and full marathon if you can run at a constant
    12·1 answer
  • 3<br> Select the correct answer.<br> What is the output of the following HTML code?<br>Please
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!