A ________ program gathers usernames, passwords, or credit card numbers when they are entered into a computer
A) bot B) keylogger C) rootkit D) computer zombie
B
You might also like to view...
The purpose of a Business Impact Analysis (BIA) is to determine:
a. The impact of a disaster b. The extent of damage in a disaster c. Which business processes are the most critical d. Which processes depend on IT systems
What is the value of the following expression?
true || false a. true b. false c. -1 d. +1 e. None of these
A macro is an action or set of actions that you can use to ________ tasks within Excel
Fill in the blank(s) with correct word
To see possible types of graph to use, you can click Recommended Charts in the ________
A) Illustrations group on the INSERT tab. B) Charts group on the INSERT tab. C) Illustrations group on the VIEW tab. D) Charts group on the VIEW tab.