________ is malware that collects information about users without their knowledge or consent

Fill in the blank(s) with correct word


Spyware. Extreme versions of spyware use keyloggers to capture userkeystrokes, including usernames and passwords.

Computer Science & Information Technology

You might also like to view...

When viewing data in a form, the Single Form view displays data one record at a time

Indicate whether the statement is true or false

Computer Science & Information Technology

If you had two separate tables for customers and the query requested customers in the first table having the same city as customers in the second table, you could use a normal ____________________ operation to find the answer.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Match the following terms to their meanings:

I. Plain Text file II. Delimited file III. Imported data IV. Source file V. Linked Access table A. A file where each record displays on a separate line and the fields are separated by a delimiter B. Will not be synchronized between the imported object and the source object C. Maintains a link to the source data D. File being imported E. This format contains no formatting such as bold or italics

Computer Science & Information Technology

A chart is composed of only the chart area and labels. You cannot change it, only re-do it after it is created

Indicate whether the statement is true or false

Computer Science & Information Technology