A ____ captures the user's passwords and credit card numbers (and sends them to someone else), or may even put the computer under someone else's remote control at some point in the future.

A. keystroke logger
B. virus
C. worm
D. sniffer


Answer: A

Computer Science & Information Technology

You might also like to view...

The Photoshop ____ consists of the Menu bar at the top of the screen, the Tools panel on the left of the screen, and the dock of panels on the right of the screen.

A. workspace B. menu C. screenshot D. design window

Computer Science & Information Technology

The second task described in a task dependency is called the ____________________ task.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Match each of the following terms to its meaning:I.gray-hat hackerII.black-hat hackerIII.cyberloafingIV.social engineeringV.white-hat hackerA.techniques used to manipulate people into performing actions or divulging confidentialĀ informationB.an unethical hackerC.flaunts expertise to the administrator of a systemD.an ethical hackerE.using an employer's computer for non-work activities

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ________ feature displays any values in the column that match what the user has typed so far

Fill in the blank(s) with correct word

Computer Science & Information Technology