A _____ is a program placed on a computer or mobile device without the user's knowledge that secretly collects information about the user.

A. ?malware
B. virus
C. ?worm
D. ?spyware


Answer: D

Computer Science & Information Technology

You might also like to view...

Draw a picture of an initially empty data structure, as described in the previous exercise, after adding the numbers 2, 8, 4, and 6, in this order.

What will be an ideal response?

Computer Science & Information Technology

Computers with low-bandwidth connections are more susceptible to hackers

Indicate whether the statement is true or false

Computer Science & Information Technology

StringBuilder greeting = new StringBuilder("Day 1"); ? Using the above StringBuilder, create a setCharAt() method that will change the "1" to a "2" in the String"Day 1". Explain how the setCharAt() method operates.

What will be an ideal response?

Computer Science & Information Technology

Electronic medical monitors take the vital signs of an individual (such as weight, blood-sugarĀ readings, or blood pressure) or prompt an individual to answer questions. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology