1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elenna [48]
3 years ago
8

If a hacker can steal your passwords by installing malware that captures all the messages you type, what kind of malware did the

hacker install
Computers and Technology
2 answers:
Free_Kalibri [48]3 years ago
4 0
Keylogger, or Spyware
Fofino [41]3 years ago
4 0

Answer:

The hacker is most likely using a keylogger

Explanation:

You might be interested in
A document repository is down when you attempt to access it. which isa principle is being violated?
Tju [1.3M]
When a document repository is down when you attempt to access it, the ISA principle Authentication is being violated. The authentication method is done during the log on phase and is performed by the ISA server which requests certificate. <span>The client then needs to send the appropriate client certificate to the server in order to be authenticated and to have access to the document.</span>
3 0
3 years ago
The organization wants you to avoid situations that make you choose between its overall benefit and your
iren [92.7K]
Personal gain is the answer :))
3 0
3 years ago
Abrupt changes in road surface or the shape of the road may indicate
Zanzabum

Answer:

D. a potential hazard

Explanation:

Abrupt changes in road surface or the shape of the road may indicate a potential hazard.

5 0
3 years ago
Read 2 more answers
When is a wired connection preferred to a wireless connection by an end-user device?
harkovskaia [24]

Answer:

Option (b) When the end-user device will run an application that requires a dedicated connection to the network

Explanation:

  • Option (b) is the correct option.
  • When the user device requires a highly dedicated network environment to itself to run a web application that requires large download and upload speeds, bandwidth requirements then it prefers a wired connection than a wireless connection.
  • If the wireless signal is within the reach, then it advisable to go for a wireless connection than a wired connection. A wired connection requires other hardware equipments like a internet connection cable etc. which is not required in case of wireless connection. So, option (a) is wrong option.
  • WLAN NIC is a wireless interface network controller that connects to a wireless radio based network than a wired network.So, option (c) is wrong option.
  • Delay torrent network is designed to operate where continuous network connectivity is not available like extreme terrestrial spaces, space communications, inter planetary communications etc.So, option (d) is wrong option.
6 0
3 years ago
A sandbox is known as a holding area for website or .
Bingel [31]

Answer:

blog

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • A. True
    6·1 answer
  • 80% OF QUESTIONS ARE ANSWERED IN UNDER 10 MINUTES why not mine
    15·2 answers
  • Gemima wants to show the amount of vitamin C a fruit salad contains in the blue cell of the table below. To do this, she needs t
    9·2 answers
  • Write a statement that toggles the value of the bool variable onoffswitch. that is, if onoffswitch is false , its value is chang
    10·1 answer
  • Which of the following is not an Operating System? Select one:
    13·1 answer
  • A(n) ____ investigation tracks all elements of an attack, including how the attack began, what intermediate devices were used du
    5·1 answer
  • Write steps for converting decimal to binary numbers?
    13·1 answer
  • What is a guardian node summary for theta staking tool
    9·1 answer
  • _______________________ variables do not need to be declared inside the function definition body, they get declared when the fun
    15·1 answer
  • Cable inside the computer transferring data between the mother board and storage devices.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!