1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fomenos
4 years ago
9

What type of program installs and gathers personal information, including password and account information, from a computer with

out permission or knowledge of the user?
Computers and Technology
1 answer:
Fynjy0 [20]4 years ago
3 0

Answer: Spyware

Explanation:

Spyware is the software program that can collect information and data about certain organization, user, etc without their permission or knowledge. It can convert that information according to the desired way after obtaining information without consent.

If spyware is used for unauthorized and malicious purpose , it is usually present in the authorized system in hidden manner for stealing, passwords, data,confidential information etc.

You might be interested in
***PLEASE HELP*** (25 POINTS) Graded Assignment
Leona [35]
When does this have to be done?
8 0
4 years ago
What is the only language a microprocessor can process directly but most programmers almost never write programs in this code? Q
elixir [45]
A microprocessor can directly process machine code but most programmers almost never write in it.
C. Machine code
7 0
3 years ago
Read 2 more answers
WNOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOW
beks73 [17]

Answer:

yes.

Explanation:

7 0
3 years ago
Which screen should be open to customize or personalize a desktop background?
stira [4]
Display Properties is the screen that should be open
5 0
3 years ago
Read 2 more answers
Important tools used in the _____ phase of the DMAIC process include a project charter, a description of customer requirements,
Anna71 [15]
Important tools used in the "Define" phase of the DMAIC process include a project charter, a description of customer requirements, process maps, and Voice of the Customer (VOC) data.
6 0
3 years ago
Other questions:
  • AI vs IA like the difference
    12·2 answers
  • Which of the following is the first step in a lockout-and-tag procedure? A. Place your lock on the breaker or switch. B. Sign yo
    12·2 answers
  • Which function of InfoSec management encompasses security personnel as well as aspects of the SETA program?
    5·1 answer
  • We discussed making incremental dumps in some detail in the text. In Windows it is easy to tell when to dump a file because ever
    5·1 answer
  • What will save you the most money when trying to reduce the cost of college
    5·2 answers
  • A security manager has discovered that sensitive information stored on a server has been compromised. The organization is requir
    7·1 answer
  • Why would you choose to use Word Art rather than a colored font when creating a Google Slides presentation? There are more fonts
    13·1 answer
  • You can use your student ID card to get discounts in all of the following except
    6·2 answers
  • HEEEEEEEEEEEEEEEEELLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLPPPPPPPPPPPPPPPPPPPPPPPPPPP
    12·2 answers
  • Which join is made with the following query?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!