software installed on a computer that produces pop-up ads using your browser

adware

digital certificate

grayware

keylogger

dictionary attack

social engineering

tailgating

Trojan

zombie

worm


adware

Computer Science & Information Technology

You might also like to view...

How does normalization differ from just raising the volume?

What will be an ideal response?

Computer Science & Information Technology

If you are nervous, a signature might not match the one on file in a signature verification system.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is the output of the following C++ code?num = 10;while (num > 10)  num = num - 2;cout

A. 0 B. 6 C. 8 D. 10

Computer Science & Information Technology

Alaina is creating a large database for the non-profit organization where she works. Alaina has a lot of data to enter, and she wants to make the process easier. She creates a ____.

A. form B. report C. query D. table

Computer Science & Information Technology