A ________ program gathers usernames, passwords, or credit card numbers when they are entered into a computer

A) bot B) keylogger C) rootkit D) computer zombie


B

Computer Science & Information Technology

You might also like to view...

The purpose of a Business Impact Analysis (BIA) is to determine:

a. The impact of a disaster b. The extent of damage in a disaster c. Which business processes are the most critical d. Which processes depend on IT systems

Computer Science & Information Technology

What is the value of the following expression?

true || false a. true b. false c. -1 d. +1 e. None of these

Computer Science & Information Technology

A macro is an action or set of actions that you can use to ________ tasks within Excel

Fill in the blank(s) with correct word

Computer Science & Information Technology

To see possible types of graph to use, you can click Recommended Charts in the ________

A) Illustrations group on the INSERT tab. B) Charts group on the INSERT tab. C) Illustrations group on the VIEW tab. D) Charts group on the VIEW tab.

Computer Science & Information Technology