1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pochemuha
4 years ago
5

What type of malicious software technology is used to monitor user behavior or gather information about the user, sometimes incl

uding personally identifiable or other sensitive information?
Computers and Technology
1 answer:
Cerrena [4.2K]4 years ago
8 0

Answer:

The answer is "Tracking software".

Explanation:

Tracking software is a technology that is used to monitor the system and mounted in an electronic device, which can monitor the status of the device remotely.  

These types of software are to monitor vehicles, which is sold via contract to a security service to help the user of the unit and notify police officers with the location of the device.

You might be interested in
In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of
Hoochie [10]

Answer:

d. ICMP Echo Reply (type 0)

Explanation:

ICMP or internet control message protocol is an Internet layer protocol in the TCP/IP suite. It works together with routing devices like the router to send messages based on results sensed in the network.

The RFC 1122 has stated that the ICMP server and end user application be configured or installed in user devices, for receiving and sending ICMP echo request packets and reply. The process is called pinging.

For an attacker to implement ping of ping, he needs to confirm if the target user in live by sending an ICMP echo request packet type 8, to receive an ICMP echo reply type0.

4 0
3 years ago
In order to accomplish the same goal, a person can click and hold down the mouse button and drag to the right, or hold Shift and
RoseWind [281]
The goal is selecting text in the document.
You can try in on your own - just open a Word (or whatever program you use) document and click on a word, and do what you wrote above and you will see that more and more parts of a word or more words will be selected the longer you hold Shift and move the right arrow key.
5 0
3 years ago
The type of business organization that can continue indefinitely is known as a
Natasha2012 [34]
C. Corporation

Corporation- The type of business organization that can continue indefinitely
6 0
3 years ago
A chip that wakes up the computer system
bezimeni [28]

Explanation:

The wake-up receiver is an ultra-low power chip that continuously looks out for a specific radio signal, called a wake-up signature, that tells it when to wake up the main device

4 0
3 years ago
The ........ tag is used to create a link to another document​
Free_Kalibri [48]

Answer:

The "a" tag or <a></a> and its "h<u>r</u>ef" attribute <a href="#"></a>

Explanation:

In html there is only one way to create a link to an external source or a bookmark. The tag is created using the element <a>.

The attribute "href" is then added to describe the link of where it is to point to.

Example:

<a href="google.com">Go to Google</a>

While the text in between the tag describes what the link is about.

7 0
3 years ago
Other questions:
  • James Hutton:
    8·1 answer
  • On an Ethernet, a ____ is broadcast to every device but is accepted only by the device to which it is addressed.
    5·1 answer
  • Which of these automotive repair areas helps the vehicle change speeds to operate efficiently under all conditions?
    5·1 answer
  • Conduct online research on web authentication and define what it is. Describe different authentication methods
    5·1 answer
  • Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
    14·1 answer
  • Player casts 'Assassinate' on 'Acolyte of pain'. Acolyte's owner will:
    6·2 answers
  • What is the difference between the throw statement and the throws clause?
    10·1 answer
  • Colin Mackay Inc., a software company with its head office in Amsterdam, has employees across three continents. Certain project
    11·1 answer
  • Universal Containers uses a custom object within the product development team. Product development, executives, and System Admin
    11·1 answer
  • Advantages and disadvantages of a watch tower​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!