1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vedmedyk [2.9K]
3 years ago
7

What type of malicious software tries to gather information about you without your consent?

Computers and Technology
1 answer:
AlekseyPX3 years ago
6 0

Answer:

B-malware

Explanation:

I do tech and i help work on computars.

You might be interested in
You are connected to a server on the Internet and you click a link on the server and receive a time-out message. What layer coul
Grace [21]

Answer: Application layer

Explanation: Application layer is the level in the OSI model which carries out the function of the abstraction in the network.The abstraction works by maintaining the interface between application and network.

It helps in the transferring of the information and data as well using the protocols. So,if any time out message alert is received  by clicking on the link then the server condition is usually busy and thus cannot respond. In this case application layer is responsible for the problem.

7 0
3 years ago
can i get an access code for free online? if yes, what website is it so i can get a free access code?​
PIT_PIT [208]

Answer:

Codecademy. Codecademy is one of the most popular free coding websites for beginners.  

freeCodeCamp.  

Coursera.  

edX.  

Codewars. ..

Code Conquest. .

GA Dash. .

Khan Academy (highly recommed)

:

6 0
2 years ago
Which of the following describes cloud computing?​
slamgirl [31]

Answer:

Cloud computing is  the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet.

4 0
3 years ago
Both computers and people handle information using which processes?
GenaCL600 [577]

Answer:

Explanation:

Both computer and human use the process of encoding, storage and retrieval to process information.

Encoding is the process of putting the information in a format that will be understood by either the human or the computer. The information is then stored in the memory. Both the computer and human have memory where the information will be store. When the information is needed, it is then retrieved from the location in which it was stored.

6 0
3 years ago
The overall cost of wiring in addressable fire alarm system is significantly cheaper than the conventional one. Why is it so?
stellarik [79]

Answer:

Yes, The overall cost of wiring in addressable fire alarm system is significantly cheaper than the conventional one.But the addressale fire alram system is more reliable than a conventional system.

Explanation:

Conventional systems are hardware-based and use analog technology. where addressable fire alarm use digital technology. addressable system is generally more reliable than a conventional system mainly due to how the different systems are wired. With a conventional system, if a device’s wire is damaged or severed, its signal and the signal of other devices down the line cannot be transmitted to the control panel.

With an addressable system, both ends of the wire connect to the control panel. Therefore, if one end becomes damaged or severed, signals can still reach the control panel through the other end of the loop. In addressable systems, a device can be removed or disabled and it will not affect the other devices in the loop.

7 0
3 years ago
Other questions:
  • Exp19_Excel_AppCapstone_Intro_Collection
    10·1 answer
  • How to change font size and style and add a table when creating a webpage?
    6·1 answer
  • Which class of fire extinguisher is appropriate for a fire involving electrical/energized electrical equipment?
    13·2 answers
  • You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon
    12·1 answer
  • Where can you access the property sheet
    8·1 answer
  • When do you use FTP?
    10·2 answers
  • The ____ option must be used when running a program in order to see the results of assert statements.
    7·1 answer
  • What are the five Ws?<br> (I don’t even know what this means)
    5·2 answers
  • Which Excel function or tool will you use to display the cells that are referred to by a formula in the selected cell
    8·1 answer
  • What are tasks performed by pascaline?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!