A ____ is a malicious program that records your keystrokes to keep track of information such as credit card and account numbers.

A. keylogger
B. hijacker
C. spyware
D. sniffer


Answer: A

Computer Science & Information Technology

You might also like to view...

You can define your own reductions for an IntStream by calling its ________ method. The first argument is a value that helps you begin the reduction operation and the second argument is an object that implements the IntBinaryOperator functional interface.

a. reduction. b. lessen c. trim d. reduce

Computer Science & Information Technology

?A word document in plain text file format preserves the formatting and layout of data.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of these contains forest-wide DNS zone data, one partition per forest?

a. ForestDNSZones b. DomainDNSZones c. OUDNSZones d. None of the above.

Computer Science & Information Technology

Case 5-1

You have written the code below and you want to step through it with some actual values to make sure that it is working in practice the way you expect it to work. ? If decGPA > 3.5 Then             If intSatScore > 1000 Then                         lblAdmissionsStatus.Text = "You have earned admission"             Else                         lblAdmissionsStatus.Text = "Retake the SAT exam"             EndIf Else             If intSatScore > 1200 Then                         lblAdmissionsStatus.Text = "You have earned probationary admission"             Else                         lblAdmissionStatus.Text = "You have been denied admission"             End If End If Assuming that an applicant has a GPA of 3.5, what is the value of lblAdmissionsStatus.Text if the applicant's SAT score is 1200? A. Retake the SAT exam B. You have earned admission C. You have earned probationary admission D. You have been denied admission

Computer Science & Information Technology