1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
3 years ago
10

A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.

Computers and Technology
1 answer:
fgiga [73]3 years ago
3 0

Answer:

keylogger.

Explanation:

A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device.

Basically, a keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.

In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky, etc.

An antivirus utility is a software application or program that's used to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.

In conclusion, a bot can use a keylogger to capture keystrokes on the infected machine to retrieve sensitive information.

You might be interested in
How can you use the Address Book to address an email message? Use the drop-down menus to complete the sentences. 1. Type an emai
Delvig [45]

Answer:

1. AutoCorrect

2. Address book

Explanation:

stan bts ?

5 0
3 years ago
Read 2 more answers
1 _ A Unit of information containing the object's position: rotation, and scale values is called:
Damm [24]

Answer:

an inform

Explanation:

A information is an inform

4 0
3 years ago
What operating systems are you familiar with?
Andrew [12]

Well there are a few like

Microsoft Windows

Apple iOS

Apple macOS

Linux Operating System

3 0
3 years ago
Help101111 avatar can we be friend's please? My name is Keegan. what is yours?
kherson [118]

Answer:

foot

Explanation:

Sub to Ssundee

6 0
3 years ago
What function in the secrets module can generate random integers between one and 30, including the possibility of both one and 3
lidiya [134]

Answer:

secrets.randbelow(31)

Explanation:

This is Python Language, and secrets is an external module. So, to use it you need to install it using pip, just type pip install secrets in any terminal. And secrets module will be installed. If you will use the 1st or last code it will give give you error, because secrets module does not have any attribute named random. If you will use the 3rd code it will print random number from 0 to 29 only. If you also want to print 30, you need to you need to write the code given below:

import secrets

secrets.randbelow(31)

6 0
3 years ago
Other questions:
  • The economist George gilder argued that
    6·1 answer
  • What’s the keyboard command I will allow you to copy text
    11·2 answers
  • 6-3.1 After visiting a large number of Web sites to complete your research for a lengthy research paper, your computer begins to
    14·2 answers
  • Calculate the addition and multiplication of N integers numbers read from the keyboard
    6·1 answer
  • What is the term that is used to describe a computer system that could store literary documents, link them according to logical
    8·1 answer
  • Write an algorithm to check whether the given number is divisible by 2,3 and 6 or not​​
    9·1 answer
  • What is an example of an attribute for a screen object
    14·1 answer
  • Karen works in a department store. Her coworker gave diverse cultural backgrounds. Which statement shows that Karen understand t
    14·1 answer
  • Conceptual note-taking is the act of writing down information in the order it is given. drawing attention to details with a mark
    8·2 answers
  • Fish Aquarium System of functional and Non-Functional requirement of the system.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!