1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vadim26 [7]
3 years ago
14

____ is any technology that aids in gathering information about a person or organization without their knowledge.

Computers and Technology
1 answer:
DanielleElmas [232]3 years ago
4 0

Answer:

Spyware

Explanation:

In most cases, a spywares are unwanted software enters into your computer or other devices and steal sensitive information, your internet usage data, and other information. Spyware is considered a malware type and a malicious one that is aimed at damaging a device or gaining control and access without the knowledge of the owner.

You might be interested in
Give an example of an outdated memory or storage device what do you think they are outdated
andreev551 [17]

Answer:

HDD technology

Explanation:

You will find that there is a big difference between the SSD and the HDD. The SSD lists out the technical advantages as well as the disadvantages related to HDD, and this has led to the wide use of the SSD rather than the HDD, which is supposed by many being an outdated product. You will find that the SSDs last longer, and they are faster. However, the SSD is more prone to damages as compared to HDD. However, SSD looks like being more advanced considering the above-mentioned advantages, and fewer number of disadvantages. And hence, many people shifted to the SSD from HDD. Remember, SSD stands for solid state drives. And HDD means hard disk drive.

8 0
3 years ago
You ping a host on the internet to check for connectivity. Your ping times out, and you get no response. What is most likely the
Reptile [31]

Answer:

It could be because you where hack. Or there was something wrong with the site that stopped it from saying why it stopped.

8 0
2 years ago
Describe the components of the Web. Your friend wants to create and publish a Web page. He tells you that he wants to learn the
iren [92.7K]

Answer:

The answer is "HTML".

Explanation:

We will suggest him to learn HTML language because It stands for HyperText Markup Language. It is a markup language that uses a build a web page and these sites are normally viewed on the web browser.

  • It is the language for development used in the World Wide Web.
  • This language includes writing, links, images, videos, and audio files.  
  • Each one of these kinds of content is tagged and described by HTML, which uses a web browser can display it correctly.
3 0
2 years ago
You are a network administrator. Your company recently approved of employees working from home one day a week and the use of emp
Orlov [11]

Answer:

To establish the BYOD policy is the correct answer to the following question.

Explanation:

<u>Implementation of the BYOD(Bring Your Own Device)</u>:

  1. Firstly, set you objectives and establish it.
  2. Then, you have to decide and tell your employees that what types of devices are only allowed in your organization.
  3. Then, establish your security policies related to the BYOD policy.
  4. Then, give good training by you or by the IT professionals to your employees.
  5. Finally, if the employee are leaving your organization then, you have to remove those employees from the BYOD policy by which they cannot access your company's informations.
8 0
3 years ago
Alice's Restaurant Supply offers a line of specialty food products to institutional
Illusion [34]

Answer:

1) the wireless standards that can be implemented are; IEEE 802.11a, IEEE 802.11b, IEEE 802.11g and IEEE 802.11n. The pros and cons are in the attachment

2) 802.11g can be implemented in alice's restaurant. This is because it provides the fastest speed and has a wide range which will not be easily disturbed by other devices

3) Please check the attachment

4) Please check the attachment.

Explanation:

3 0
3 years ago
Other questions:
  • Which Internet resource can you use to publicly describe an adventure trip you recently made?
    9·1 answer
  • Which presenter would most likely benefit from a custom slide show?
    10·2 answers
  • Consider the concept of cultural lag. Identify two American values that are “lagging.” What are three norms that are lagging? Ho
    11·1 answer
  • What pressure will be shown on the high side peessure gauge (ac system on)
    12·1 answer
  • What is an example of a memo
    9·1 answer
  • The keyboard usually has six rows of keys. Which of the following is not one of the key group categories?
    7·2 answers
  • Identify the electronic community that is a social-networking site.
    5·2 answers
  • Which of the following is not a key way that a LAN shares
    15·1 answer
  • Write a program that reads from the user any three points in two dimensional space: x1, y1, x2, y2, x3, y3. Assume these points
    13·1 answer
  • The use of Quick Styles is a great way to save
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!