________ is a type of malware which is designed to report activity on your computer to another party.

A. DDoS
B. Trojan horse
C. Ransomware
D. Spyware


Answer: D

Computer Science & Information Technology

You might also like to view...

Excel protection features can be found in the Changes group on the ________ tab

A) View B) Review C) Insert D) Data

Computer Science & Information Technology

What is a hypervisor?

What will be an ideal response?

Computer Science & Information Technology

The phrase programming _____________ refers to a way of conceptualizing and structuring the tasks a computer performs.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The INVENTORY table at Henry Books includes a column that stores the number of books on hand.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology