1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pochemuha
4 years ago
5

What type of malicious software technology is used to monitor user behavior or gather information about the user, sometimes incl

uding personally identifiable or other sensitive information?
Computers and Technology
1 answer:
Cerrena [4.2K]4 years ago
8 0

Answer:

The answer is "Tracking software".

Explanation:

Tracking software is a technology that is used to monitor the system and mounted in an electronic device, which can monitor the status of the device remotely.  

These types of software are to monitor vehicles, which is sold via contract to a security service to help the user of the unit and notify police officers with the location of the device.

You might be interested in
Can you sue someone in brainly? How is this not relate to education?
Harman [31]

Answer:

Ima say no you cant but you can probably email the person in charge of brainly and tell them and then i do not know the answer to the 2nd question.

6 0
3 years ago
What is the first step in planning a multi-table query?
pshichka [43]
When making a multi-table query in Microsoft Office, there must be an assurance that the tables are properly determined in the "Relationships Window." After which, the Microsoft Office's Query Wizard would greatly come in handy in constructing the multi-table query you want to create.
3 0
4 years ago
What describes the current cloud landscape for business?
KonstantinChe [14]

Answer:

Organizations need to change the vast majority of their tasks to the cloud to stay competitive describes the current Cloud landscape for business

Explanation:

All cloud computing frameworks are effectively open over the web with minimal requirement for actual equipment other than cloud servers at the back end.

5 0
3 years ago
2 of 10
ra1l [238]

Answer:

D

Explanation:

Just took the test

5 0
3 years ago
In public-key encryption, the two keys–one for coding and one for decoding–are known as ________.
Feliz [49]
Public key and private key  - In public key encryption, a pair of keys is used (public key and private key). The public key can be made available publicly, while the private key is only known  by the owner. The public key is used to encrypt the message, while the private key is used to decrypt the message.
5 0
3 years ago
Other questions:
  • A device that makes it possible for multiple customers to share one address is called a/n _____.
    15·1 answer
  • Your computer is once again out of hard drive and you want to see which folders are consuming the most space on your drive. Whic
    15·1 answer
  • OSHA requires training for employees on the hazards to which they will be exposed.
    12·2 answers
  • Which keyboard feature is a form feed character?
    15·1 answer
  • WHAT DOES THE WORD MONOCHROME MEAN?
    11·1 answer
  • All of the following are types of goals listed in the course except?
    14·2 answers
  • PowerPoint Presentation on What type of device will she use to display her presentation and explain it to the rest of the childr
    13·2 answers
  • Database developers use the ________ to create relationships in the database.
    7·1 answer
  • Why is data processing done in computer?​
    14·1 answer
  • Distinguish<br> between formal and Informal<br> Information System<br> Information systems
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!