Programs used to secretly record an individual's activities on the Internet are called ________.

A. cookies
B. keyloggers
C. spyware
D. sniffer programs


Answer: C

Computer Science & Information Technology

You might also like to view...

MC A try statement must contain__________ .

a) a finally clause. b) one or more except clauses. c) a finally clause or one or more except clauses. d) a finally clause and one or more except clauses.

Computer Science & Information Technology

Assume that, in addition to the operations read(x) and write(x), a database has the operation increment(x,C), which (atomically) increments the value stored in record x by the constant C, which might be positive or negative. Design a conflict table for these operations for use in an immediate-update pessimistic concurrency control.

What will be an ideal response?

Computer Science & Information Technology

On the first pass of a bubbles sort, when two adjacent elements are compared, if the one on the left has a greater value than the one on the right, they are swapped.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

An Excel web query creates a(n) ________ to the original web page so that you will have the most up-to-date data

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology