Carrie is examining a piece of malware and determines that it was gathering information about the user of a system. Which of the following terms can she use to describe this malware?

What will be an ideal response?


Spyware

Computer Science & Information Technology

You might also like to view...

A file ________ is what a computer's operating system uses to determine which program to use to open a file

A) template B) extension C) hyperlink D) section

Computer Science & Information Technology

The Form Header and Form Footer sections display on every form page

Indicate whether the statement is true or false

Computer Science & Information Technology

To begin a formula in a cell, first type the # symbol

Indicate whether the statement is true or false

Computer Science & Information Technology

A ____ is a user-designed layout of database content.?

A. ?report B. ?form C. ?table D. ?query

Computer Science & Information Technology