A program that is potentially harmful or potentially unwanted

adware

digital certificate

grayware

keylogger

dictionary attack

social engineering

tailgating

Trojan

zombie

worm


grayware

Computer Science & Information Technology

You might also like to view...

The look and feel of a blog CANNOT be customized

Indicate whether the statement is true or false

Computer Science & Information Technology

Which tab in Task Manager is used to determine if more RAM is needed?

a. Applications b. Performance c. Services d. Processes.

Computer Science & Information Technology

Once a person has agreed to be a reference, it is good practice to post the contact information for that reference on your website.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Keith wants to use Word to publish an article to the Internet, so that other people can read and respond to it. What steps does he need to take to do this?

What will be an ideal response?

Computer Science & Information Technology