type of spyware that tracks your keystrokes, including passwords

adware

digital certificate

grayware

keylogger

dictionary attack

social engineering

tailgating

Trojan

zombie

worm


keylogger

Computer Science & Information Technology

You might also like to view...

?Case 19-3 Linda has recently started her job as a nursing supervisor at Hankons Cancer Treatment Centre. As part of the job, she has to look into the database of all the currently admitted patients and their ongoing treatment status. Linda uses the data obtained to create a form, in Microsoft Access 2016, with a main form titled "Identity" and a subform titled "Illness."She notices that this form includes two sets of navigation buttons. If Linda enters data in the main form "Identity," the _____ table is updated.

A. ?allied B. ?primary C. ?related D. ?foreign

Computer Science & Information Technology

Theme fonts can be revised

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ properties are used to prevent the end user from deleting form controls

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ____________________ axis on a column chart shows the names of the categories being charted.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology