1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
3 years ago
10

A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.

Computers and Technology
1 answer:
fgiga [73]3 years ago
3 0

Answer:

keylogger.

Explanation:

A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device.

Basically, a keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.

In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky, etc.

An antivirus utility is a software application or program that's used to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.

In conclusion, a bot can use a keylogger to capture keystrokes on the infected machine to retrieve sensitive information.

You might be interested in
STEAM game launcher question.
son4ous [18]

Answer:

Try to look up csgo map maker and you might be able to transfer the file

Explanation:

4 0
3 years ago
Is it ok to give a website your zip code?
Salsk061 [2.6K]
When a website takes in personal information from a user, the owners of the website have no idea what was input, no matter how hard they tried. The information is not stored, and is used by Javascript APIs to locate your address to either ensure that it is valid, or so that you can choose your address.

It's completely safe, and if a website looks really, really sketchy, then just don't give them anything personal.

Another way to identify if a website is safe to give your personal information to is if you see "HTTPS" in the URL at the top of your browser. This means Hyper Text Transfer Protocol Secure, and is the protocol used to transfer information over the internet SECURELY, via encryption that only computers are able to decrypt, and will not show that information to owners of the server/website.
5 0
3 years ago
4. What is the formula for calculating the file size?
Verizon [17]
Step 2: Multiply total number of pixels by the bit depth of the detector (16 bit, 14 bit etc.) to get the total number of bits of data. Step 3: Dividing the total number of bits by 8 equals the file size in bytes. Step 4: Divide the number of bytes by 1024 to get the file size in kilobytes.
7 0
3 years ago
Write 5 chart types​
Lemur [1.5K]

Answer:

pie chart

line chart

area chart

bar charts

histogram

scatter plot

6 0
3 years ago
Calcule la carga que puede levantar un cabrestante si la manivela mide 40 cm y el El radio del molinete es una tercera parte de
Luda [366]

Answer:

C

Explanation:

because...

5 0
3 years ago
Other questions:
  • Debugging is not testing, but always occurs as a consequence of testing. <br> A) TRUE<br> B) FALSE
    13·1 answer
  • People in STEM careers are considered thinkers who reach conclusions through sound judgment and reasoning.
    11·1 answer
  • A server that provides data transfer and storage space at remote locations is called a
    7·1 answer
  • What are some objects in your home that demonstrate electrical energy to radiant energy to thermal energy
    10·2 answers
  • Design a full adder circuit using NAND gates only (input : A, B, Cin and output = S, Cout).
    5·1 answer
  • Which of the following is not a key way that a LAN shares
    15·1 answer
  • Draw a datapath that can perform the following set of register replacement and combinational operations. Assume all registers ar
    5·1 answer
  • An IT security threat is anything that might cause serious harm to a computer system, including someone stealing a laptop that c
    8·2 answers
  • Function of pons for class 7​
    15·1 answer
  • Effective online learning method for students
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!