Select the term used to describe tracking software that is deployed without the consent or control of the user.

A. botnet
B. malware
C. spyware
D. Trojan


Answer: C

Computer Science & Information Technology

You might also like to view...

To add an item to a CheckedListBox you may use:

a) the Add method b) the AddRange method c) the String Collection Editor d) All of the above

Computer Science & Information Technology

Which of the following would be considered software as a service?

A) A subscription-based, pay-as-you-go service that provides custom application code B) Leased space for your datacenter infrastructure C) A development platform for building applications D) The use of WordPress to develop webpages in the cloud E) None of the above F) A and D

Computer Science & Information Technology

________ are wireless access points that are available in public spaces

A) Hyperlinks B) Network Access Points C) Internet protocols D) Hotspots

Computer Science & Information Technology

A(n) ____________________ is a computer program that can replicate itself and move from computer to computer.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology