Which of these is a general term used for describing software that gathers information without the user's consent?

A. scrapeware
B. gatherware
C. spyware
D. adware


Ans: C. spyware

Computer Science & Information Technology

You might also like to view...

Grid-clustering techniques are different from other clustering techniques in that they partition space instead of sets of points.

(a) How does this affect such techniques in terms of the description of the resulting clusters and the types of clusters that can be found? (b) What kind of cluster can be found with grid-based clusters that cannot be found by other types of clustering approaches? (Hint: See Exercise 20 in Chapter 8, page 564.)

Computer Science & Information Technology

(Computer-Assisted Instruction: Difficulty Levels) Exercise 5.56 through Exercise 5.58 de- veloped a computer-assisted instruction program to help teach an elementary school student multi- plication. Modify the program to allow the user to enter a difficulty level. At a difficulty level of 1, the program should use only single-digit numbers in the problems; at a difficulty level of 2, numbers as large as two digits, and so on.

What will be an ideal response?

Computer Science & Information Technology

Live ________ shows the user the result of a formatting change if the user selects it

Fill in the blank(s) with correct word

Computer Science & Information Technology

Summary tasks in Project 2013 are italicized in the Summary table

Indicate whether the statement is true or false

Computer Science & Information Technology