Which malicious software collects private user data?

A. Virus
B. Spyware
C. Worm
D. Trojan horse


B Spyware collects private user data.

Computer Science & Information Technology

You might also like to view...

In the ____ method, if a collision occurs with the hash function h, we use a series of hash functions, h1, h2, . . ., hs.

A. overhashing B. recomputing C. rehashing D. precomputing

Computer Science & Information Technology

Reading view provides options for color scheme and font size settings that can ____ eyestrain.?

A. ?increase B. reduce C. ?cause D. create

Computer Science & Information Technology

COGNITIVE ASSESSMENT Which of the following does NOT improve with the database approach?

A. data integrity B. data sharing C. access D. data security

Computer Science & Information Technology

_____ is a process for controlling changes in system requirements during software development.

A. Data management B. Disk management C. Configuration management D. Email management

Computer Science & Information Technology