What type of malicious software technology is used to monitor user behavior or gather information about the user, sometimes including personally identifiable or other sensitive information?

A. automatic download software
B. automated software
C. system modifying software
D. tracking software


Answer: D

Computer Science & Information Technology

You might also like to view...

When a Microsoft Word file is inserted into an OpenOffice Writer file, Writer inserts a ________ before the inserted document

A) section B) page break C) manual line break D) leader

Computer Science & Information Technology

Which of the following is not true about posting comments to a blog?

A) Blogging is a Web 3.0 technology, so the ability to allow users to interact with the site is what distinguishes this from simply publishing opinions on a website. B) Blog owners have to find a balance between leaving the comment area too open, and making commenting difficult. C) Leaving the commenting entirely open can attract spammers and scammers, who will post legitimate looking comments with links to other sites. D) Comments can be open for anyone to post, or they can have varying levels of security.

Computer Science & Information Technology

____________ provides a standard infrastructure for global electronic business.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A comment or saved annotation is only visible if you have ________ active

Fill in the blank(s) with correct word

Computer Science & Information Technology