Which malicious software collects private user data?
A. Virus
B. Spyware
C. Worm
D. Trojan horse
B Spyware collects private user data.
You might also like to view...
In the ____ method, if a collision occurs with the hash function h, we use a series of hash functions, h1, h2, . . ., hs.
A. overhashing B. recomputing C. rehashing D. precomputing
Reading view provides options for color scheme and font size settings that can ____ eyestrain.?
A. ?increase B. reduce C. ?cause D. create
COGNITIVE ASSESSMENT Which of the following does NOT improve with the database approach?
A. data integrity B. data sharing C. access D. data security
_____ is a process for controlling changes in system requirements during software development.
A. Data management B. Disk management C. Configuration management D. Email management