A set of programs that allows someone to gain control over a computer while hiding that the computer has been compromised is a(n) ________

A) adware script B) rootkit C) firewall D) keylogger


B

Computer Science & Information Technology

You might also like to view...

By default, what is the maximum number of equal-cost OSPF routes that will be inserted into the routing table?

A) 4 B) 6 C) 1 D) 2

Computer Science & Information Technology

The World Wide Web is a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called _____.

A. HTTP B. HTML C. FTP (file transfer protocol) D. IP

Computer Science & Information Technology

Modify the algorithm used in this chapter to locate the longest run of non?consecutive characters in the string.

What will be an ideal response?

Computer Science & Information Technology

When creating or modifying a PivotTable, the user can create a calculated field by clicking this icon in the Design tab of the Ribbon:

A) Properties. B) Formula. C) Format. D) Captions.

Computer Science & Information Technology