1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler [38]
3 years ago
8

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: Ques

tion 6 options: A) botnet B) adware. C) a backdoor. D) spyware.
Computers and Technology
1 answer:
sdas [7]3 years ago
4 0

Answer:

The correct answer is D) Spyware.

Explanation:

Also known as a Malicious Software (or Malware for short), a Spyware is designed to gain unsolicited entrance into ones computer and when executed, performs the function of illegally stealing one's private information and sending them to the hacker or originator of the software.

The following have been identified as spyware threats:

  1. Transponder (vx2)
  2. Hot as Hell
  3. BlazeFind
  4. Internet Optimizer

Cheers!

You might be interested in
When using the Python shell and code block, what triggers the interpreter to begin evaluating a block of code
finlep [7]

Answer:

The answer is "A blank line".

Explanation:

The blank line initiates the interpreter to start examining the line of statements whenever the Python shell as well as the code block are used.  

  • It is also known as the line that has nothing but spaces or lines without texts or a line.  
  • It prints an empty sheet,  which leaves its performance with such a blank line.

5 0
3 years ago
In poor weather , you should ___ your following distance.
svlad2 [7]

Answer:

lengthen

Explanation:

will take more time to stop on wet and slippery surfaces

3 0
3 years ago
How we know that how many domain exist in window server 2012?
seraphim [82]

A Windows domain is a form of a computer network in which all user accounts, computers, printers and other security principals, are registered with a central database located on one or more clusters of central computers known as domain controllers. Authentication takes place on domain controllers.

5 0
3 years ago
Which of the following is a result of gravity in relation to moving tectonic plates?
Radda [10]
I am not sure but here is a guess I think it might be C- earth's magnetic field reverses
4 0
3 years ago
Read 2 more answers
An Olympic-size swimming pool is used in the Olympic Games, where the race course is 50 meters (164.0 ft) in length. "In swimmin
Sveta_85 [38]

Answer:

In Python:

def  meters_to_laps(length):

   lap = length/50

   print('{:.2f}'.format(lap))

Explanation:

This line defines the function

def  meters_to_laps(length):

This calculates the number of laps

   lap = length/50

This prints the calculated number of laps

   print('{:.2f}'.format(lap))

To call the function from main, use:

<em>meters_to_laps(150)</em>

7 0
3 years ago
Other questions:
  • Depending on the manufacturer of the bios, what two different post beep code sequences indicate a memory error?
    11·1 answer
  • TLS is not generally compatible with SSL because:__________. 1. SSL is proprietary while TLS is open 2. SSL can interact with it
    10·1 answer
  • In a @return tag statement the description:
    13·2 answers
  • Print person1's kids, call the incNumKids() method, and print again, outputting text as below. End each line with a newline.
    9·1 answer
  • When do you need to use a fully qualified url in a hyperlink?
    6·1 answer
  • Katla is a project manager. One of the programmers on her team comes to her and says that he permanently deleted some code mista
    5·1 answer
  • Which of these describes, in increasing order, the file sizes of the same image in different formats? Group of answer choices
    6·1 answer
  • How does communication produce clarity and direction​
    13·1 answer
  • (2) Design a program to determine if a student is entitled to an incentive granted upon payment of
    13·1 answer
  • List four types of Web browsers<br>​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!