________ secretly gathers personal information about you.

a. Malware
b. Virus hoaxes
c. Spyware
d. Caches


c. Spyware

Computer Science & Information Technology

You might also like to view...

In what library is the function atoi found?

A. it is part of “using namespace std” B. C. D.

Computer Science & Information Technology

To select an entire word in a document using a touchscreen, place the insertion point somewhere in the word and then ________ the screen

Fill in the blank(s) with correct word

Computer Science & Information Technology

When a frame arrives at the switch, the switch makes an exact copy of the frame and sends it to every other system on the network.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of the router, which of the following tools should the technician use?

A. Loopback adapter B. Cable tester C. Tone generator D. Multimeter

Computer Science & Information Technology