1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetradugi [14.3K]
3 years ago
11

which program monitors the computer by looking for known trouble makers as well as suspicious behavior​

Computers and Technology
1 answer:
lys-0071 [83]3 years ago
3 0

Answer:

i think spyware because spyware can collect almost any type of data, including personal information like internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with a user's control of a computer by installing additional software or redirecting web browsers.

Explanation:

You might be interested in
On a rheostat the first terminal is connected to a
Morgarella [4.7K]
On a rheostat the first terminal is connected to a
A ground return path
fined contact
Ceramic heat sink
Bbbbncnennanxkcndkfnrnenwn77819’cjchopeithlps they
5 0
3 years ago
The advantage of using a spreadsheet is:
Rama09 [41]

because it's a good thing

5 0
2 years ago
Is the Internet dangerous?
VARVARA [1.3K]

Many people would answer this in many different ways. In my personal opinion, it's a yes. It's a yes because it makes it easier for people to track you down (finding your iep) and it's easy for someone to take your identity. It's also dangerous for children and teens (even young adults) because there are many people wanting them, and wanting to meet them in public and things like that. I hope I answered your question! (:

8 0
3 years ago
Read 2 more answers
3.5 Code Practice: Question 1<br> (Website: Edhesive)
igor_vitrenko [27]
Sorry the website wasn’t working for me
3 0
3 years ago
Which element can be changed using the Print pane? Check all that apply.
Ronch [10]

Answer:

B

C

D

E

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • The number of bits used to store color information about each pixel is called ____.
    13·1 answer
  • The concept of plug and play" is demonstrated by which of the following
    15·1 answer
  • An app builder has created a report for sales people to view records from the custom object, some users have complained that the
    8·1 answer
  • What can be done to improve the security of business uses of the Internet? Give several examples of ecurity measures and technol
    9·1 answer
  • The electric company gives a discount on electricity based upon usage. The normal rate is $.60 per Kilowatt Hour (KWH). If the n
    7·1 answer
  • Identify the benefit of modeling to communicate a solution. ​
    11·2 answers
  • Window frame will expand to fill the entire desktop when you
    12·1 answer
  • Kos-huar-utb garls jonly​
    8·2 answers
  • State True or False: 1. Application software can run without the presence of system software. 2. . A language processor translat
    14·1 answer
  • Why are salaried employees often excluded from overtime pay
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!