Select the term used to describe tracking software that is deployed without the consent or control of the user.
A. botnet
B. malware
C. spyware
D. Trojan
Answer: C
You might also like to view...
To add an item to a CheckedListBox you may use:
a) the Add method b) the AddRange method c) the String Collection Editor d) All of the above
Which of the following would be considered software as a service?
A) A subscription-based, pay-as-you-go service that provides custom application code B) Leased space for your datacenter infrastructure C) A development platform for building applications D) The use of WordPress to develop webpages in the cloud E) None of the above F) A and D
________ are wireless access points that are available in public spaces
A) Hyperlinks B) Network Access Points C) Internet protocols D) Hotspots
A(n) ____________________ is a computer program that can replicate itself and move from computer to computer.
Fill in the blank(s) with the appropriate word(s).