Programs that record your keystrokes or look at information on your hard drive are known as:

A) malware B) firmware C) spyware D) viruses


C

Computer Science & Information Technology

You might also like to view...

The Big Three consists of which three from this list?

a) Default constructor b) Copy constructor c) Constructor with two parameters d) destructor e) Operator=

Computer Science & Information Technology

A(n) ____________________ is a location on the horizontal ruler that tells Word where to position the insertion point when you press the TAB key on the keyboard.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In CGI, the abstract concept of motion is defined in terms of matrix ____________________, an algorithmic operation easily programmed on a computer.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

One common buffer overflow attack is called the ____________________, where the target is to overwrite internal data of a program.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology