Carrie is examining a piece of malware and determines that it was gathering information about the user of a system. Which of the following terms can she use to describe this malware?
What will be an ideal response?
Spyware
Computer Science & Information Technology
You might also like to view...
A file ________ is what a computer's operating system uses to determine which program to use to open a file
A) template B) extension C) hyperlink D) section
Computer Science & Information Technology
The Form Header and Form Footer sections display on every form page
Indicate whether the statement is true or false
Computer Science & Information Technology
To begin a formula in a cell, first type the # symbol
Indicate whether the statement is true or false
Computer Science & Information Technology
A ____ is a user-designed layout of database content.?
A. ?report B. ?form C. ?table D. ?query
Computer Science & Information Technology