________ is a type of malware which is designed to report activity on your computer to another party.
A. DDoS
B. Trojan horse
C. Ransomware
D. Spyware
Answer: D
Computer Science & Information Technology
You might also like to view...
Excel protection features can be found in the Changes group on the ________ tab
A) View B) Review C) Insert D) Data
Computer Science & Information Technology
What is a hypervisor?
What will be an ideal response?
Computer Science & Information Technology
The phrase programming _____________ refers to a way of conceptualizing and structuring the tasks a computer performs.?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The INVENTORY table at Henry Books includes a column that stores the number of books on hand.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology