1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GalinKa [24]
3 years ago
10

When a person visits a web site, his or her ip address and the links he or she clicked on are automatically recorded. this is an

example of answer
a. secondary use
b. invisible information gathering
c. data spillage
d. data mining?
Computers and Technology
1 answer:
allochka39001 [22]3 years ago
8 0
B. Invisible information gathering.
You might be interested in
A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a _____.
masha68 [24]

This is a trojan horse type of virus.

5 0
3 years ago
Read 2 more answers
Many advertisers are now introducing video ad campaigns that stretch across multiple viewing​ platforms, such as traditional tel
Evgen [1.6K]
The term that best fits the blank provided is DIGITAL VIDEO AD CONVERGENCE. The concept that is being described above is what we call the digital video ad convergence and this covers different types of media platforms as a way to introduce or advertise a product or a service.
8 0
3 years ago
What engine component is shown in the above Figure?
astra-53 [7]

send attached file with it


5 0
3 years ago
Read 2 more answers
Which term refers to actions that you would typically perform on a computer to revive it even if it functions in an unexpected m
sweet-ann [11.9K]
You'd usually reboot a PC if it malfunctions.
6 0
3 years ago
Survey data can be collected with questionnaires. Which type of question has a limited number of preselected responses?
nadya68 [22]
The answer to your problem is B
8 0
3 years ago
Other questions:
  • When you append a(n) ____ to a command, the command is run in a background process?
    8·1 answer
  • Fullsoft, Inc. is a software development company based in New York City. Fullsoft’s software product development code is kept co
    10·1 answer
  • BI is an umbrella term that combines architectures, tools, databases, analytical tools, applications, and methodologies. b. BI i
    10·1 answer
  • Which of the following methods is the easiest way to set up a VPN client on a computer for a user who is not technical?
    12·1 answer
  • It is important for security practitioners to take into consideration the __________ element when devising password security pol
    15·1 answer
  • What was the best Metal Gear Solid you enjoyed the most?​
    6·1 answer
  • Introduction to computing systems: from bits and gates to c and beyond
    7·1 answer
  • Write 3 things that can't be done without technology. write your opinion?
    14·2 answers
  • What critical-thinking tool is being used when asking the question, Is this information specific enough?
    9·1 answer
  • Mingji is working to transfer photos from her digital camera to her computer. While
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!