1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elenna [48]
3 years ago
8

If a hacker can steal your passwords by installing malware that captures all the messages you type, what kind of malware did the

hacker install
Computers and Technology
2 answers:
Free_Kalibri [48]3 years ago
4 0
Keylogger, or Spyware
Fofino [41]3 years ago
4 0

Answer:

The hacker is most likely using a keylogger

Explanation:

You might be interested in
Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3,
Luden [163]

Answer:

This is not true

Explanation:

The optimal Huffman code is used to encrypt and compress text files. It uses fixed-length code or variable-length code for encryption and compression of data.

The professor's character code is similar to Huffman's variable-length coding which uses variable length od binary digits to represent the word strings. The file size of the text file above is;

= 6 x 1 + 2 x 2 + 3 x 2 + 2 x 2 + 8 x 1 = 28 bits

This would be the same for both cases.

The encrypt would be the problem as the encoded and decoding of the characters B and E may cause an error.

8 0
3 years ago
Write a class called SimpleSquare that has the following properties: - public int field called num - private int field called sq
mezya [45]

Answer:

public class SimpleSquare{

   public int num;

   private int square;

   

   public SimpleSquare(int number){

       num = number;

       square = number * number;

   }

   

   public int getSquare(){

       return square;

   }    

}

Explanation:

*The code is in Java.

Create a class called SimpleSquare

Declare two fields, num and square

Create a constructor that takes an integer number as a parameter, sets the num and sets the square as number * number.

Since the square is a private field, I also added the getSquare() method which returns the value of the square.

6 0
3 years ago
Kevin is working in the Tasks folder of his Outlook account. Part of his computer screen is shown below.
klasskru [66]

Answer:

D

Explanation:

7 0
3 years ago
In terms of system thinking, what is process?
Talja [164]

Answer:b) The computer program that processes the data.

Explanation: In the computer system , process is the part of computer program which are responsible for performing of the processing of the data and other functions .The working of the process is associated with the program code and related activities/functions.

Other options that are mentioned in the question are incorrect because they don't describe the process correctly .Thus , the correct answer is option (b).

5 0
3 years ago
Read 2 more answers
Select the correct text in the passage.
oksian1 [2.3K]

Answer:

Answer is given below

Explanation:

The index of the smallest value returned by function positionMin(),

and it is done by line "return minPosition;"

The input array is given as an argument in function selSort() and it is done by line "public static void selSort(int [] vals)" Here vals is input array argument.

6 0
3 years ago
Other questions:
  • Data mining must usestatistics to analyze data.<br> True<br> False
    12·1 answer
  • You want to drive traffic to a new landing page for a campaign, and want a web address that's short, easy to remember, trackable
    7·1 answer
  • Web browsers are used to browse the world wide web.
    5·2 answers
  • A company wants a recruiting app that models candidates and interviews; displays the total number of interviews each candidate r
    6·1 answer
  • Why is it important to have at least one backup stored off-site?
    8·1 answer
  • What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's dev
    5·2 answers
  • Why should you avoid the use of sarcasm, clichés, and idioms in business letters?
    11·2 answers
  • How many questions have you seen so far other than this one?
    10·2 answers
  • What are your considerations in making a derivative ict content ti effectively communicate or present data or information?
    11·1 answer
  • Hurry please i need this ASAP<br><br>What might be some advantages to keeping CSS and HTML separate?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!