________ is malware that collects personal information or changes your browser settings

A) Spyware B) A worm C) A virus D) A Trojan horse


A

Computer Science & Information Technology

You might also like to view...

Alice provides functions that will build and display dialog objects.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Exporting a query as a Microsoft Excel workbook will:

A) require additional processing and computer needs. B) increase the performance and optimization of the query. C) Automatically save the changes to the query in the Access database. D) provide an additional layer of data integrity as the original data is stored safely in the database and is protected from any errors that could originate in the spreadsheet.

Computer Science & Information Technology

An administrator has configured a new Linux server with the FTP service. Upon verifying that the service was configured correctly, the administrator has several users test the FTP service. Users report that they are able to connect to the FTP service and download their personal files, however, they cannot transfer new files to the server.Which of the following will most likely fix the uploading issue for the users?

A. Create an ACL to allow the FTP service write access to user directories B. Set the Boolean selinux value to allow FTP home directory uploads C. Reconfigure the ftp daemon to operate without utilizing the PSAV mode D. Configure the FTP daemon to utilize PAM authentication pass through user permissions

Computer Science & Information Technology

When a style is changed in an embedded stylesheet, it automatically applies the change to every page linked to that style sheet.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology