Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?

Answers

Answer 1
That would be what is known as Spyware, a common form of this is known as a "Trojan Horse". This type of malware is typically latched on and hidden within files, such as when downloading a pirated version of a song, game, art-work, etc...
Answer 2
This is called spyware, so I'd say it would be a Trojan Horse, since those can install without alerting anything really.

Related Questions

An administrator needs to install a domain controller in a remote office, with the requirement that the domain controller does not store password information. what type of domain controller should the administrator install?

Answers

He should deploy an RDOC controller. 

The format cells dialog box tab that provides options for locking or hiding cells to prevent other users from modifying their contents is _____.

Answers

The format cells dialog box tab that gives choices to locking or concealing cells to keep different clients from altering their substance is protection. It is part of Microsoft office application that enables to lock or protect the data. It is a way of protecting the files.

The process of building new systems by combining packaged software, existing legacy systems, and new software written to integrate everything together is called _____.

Answers

The answer would be System intergration

What should you enter at the command prompt to scan for open tcp ports on your linux system?

Answers

netstat -ant

I like to add "p" to get the process' name that's listening.

A monitor is a type of A.cpu B.imput C.memory D.output

Answers

a monitore is a type of a cpu

Answer:

A monitor is a type of Output.

Some input devices include a kind of output that provides the user with a physical response from the device. what kind of output is this

Answers

CORRECTION: Tactile Output

Final answer:

Haptic feedback is the physical response given by an input device to the user, which includes vibrations and audible clicks, providing a more intuitive way to interact with technology.

Explanation:

The kind of output that provides a user with physical response from an input device is known as haptic feedback. This feedback can come in various forms such as vibrations, force feedback, or even the sensation of motion. For example, graphics tablets use the principle of induction where the pen emits a tiny magnetic field that interacts with wires underneath the screen to create an electromotive force (emf), translating the movement into a visual line on the screen. Similarly, some counters designed to measure voltage changes emit an audible click and also display the change on a meter, providing both auditory and visual feedback to the user. This interactivity enhances the user experience and allows for a more intuitive and immersive interaction with technology.

A ____ copies and then automatically compresses files and folders from a hard disk to a single file, called a backup file.

Answers

 A back-up program copies and then automatically compresses files and folders from a hard disk to a single file, called a back-up file

An icon on your desktop is a component of a ____ interface.

Answers

GUI - Graphical User Interface

â________________ software can sometimes be used to decrypt a drive that is utilizing whole disk encryption.

Answers

Elcomsoft forensic disk decryptor software can sometimes be used to decrypt a drive that is utilizing whole disk encryption.
Elcomsoft Forensic Disk Decryptor is a software that Perform the complete forensic analysis of encrypted disks and volumes protected. It has two access modes: Full Decryption and Real-Time Access to Encrypted Information. There are at least three different methods for acquiring the decryption keys. Its license price is $299.

With a ____ indent, all lines except the first line of the paragraph are indented from the left margin.

Answers

The answer to this question is a hanging indent. A hanging indent is a writing format where in the first line of the text or paragraph is being aligned in the left margin. A hanging indent is also known as the hanging paragraph.  

Final answer:

A hanging indent is used when all lines except the first line of the paragraph are indented from the left margin. This formatting technique is commonly used for references in academic writing. It can be applied in Microsoft Word using the 'Paragraph' settings.

Explanation:

With a hanging indent, all lines except the first line of the paragraph are indented from the left margin. This formatting style is commonly used in academic writing for citing references and constructing bibliographies. In Microsoft Word, after selecting the text, one can create a hanging indent by choosing 'Hanging' from the 'Special' options in the 'Indentation' section of the 'Paragraph' menu.

For block quotations in academic papers, which are quotations of more than four lines, the entire quotation is indented to signify a direct quote without the need for quotation marks. Additionally, when quoting more than three lines from a poem, you should also indent the quotation one-half inch from the left margin and omit quotation marks. Always introduce your block quote with a colon and include the page number at the end of the quotation, after the punctuation, in parentheses.

____ are diagrams used in mathematics and logic to help describe the truth of an entire expression based on the truth of its parts.

Answers

Truth tables are diagrams used in mathematics and logic to help describe the truth of an entire expression based on the truth of its parts.

A truth table shows all the possible combinations (outputs) that can be produced from the given inputs. They are mainly used in Boolean algebra.

Servers and high-end workstations commonly use _______ memory, which is specialized memory as it has additional circuitry to manage large amounts of ram.

Answers

I am 100% sure that complete statement should look like this: Servers and high-end workstations commonly use buffered memory, which is specialized memory as it has additional circuitry to manage large amounts of ram. Buffered memory helps to speed up some process by reserving a particular amount of RAM for it.

Provide 3 ways in which the government can ensure that the help it offers is received only by the people who are in need

Answers

The first way is to build the houses for needy and poor people.Then free education and job opportunities should be provided to each and every people. Food should be provided at lower rates to the poor people so that our country will not face any poverty problems, and also food stamps can be given out. If the government offers all of these listed above then it is one of the best government for the people.

Once you have saved a block of text or graphics fir easy insertion in other documents, you'll see it in the _____ gallery. 
A. clip art
B. multimedia online
C. photo space
D. quick parts


I thought the answer was A. Clip art, but I got it wrong and I can't seem to find it anywhere in the lesson. 

Answers

The quick part is used to access and reuse building blocks. Building blocks are pieces of content like block of text or graphic that can be reused and are stored in galleries. Once you have saved a block of text or graphics fir easy insertion in other documents, you'll see it in the quick parts gallery. (solution:D). You should click where you want to insert the block and than position on the Insert tab, in the Text group and click Quick Parts. 

From which part of the boat should you lower the anchor line?

Answers

The anchor line should be lower from the BOW, ATTACH THE LINE TO THE BOW CLEAT. Anchoring from the bow prevents taking on of water into the vessel which can lead to swamping or capsizing of the vessel. It is recommended never to tie the anchor line to the stern, the additional weight could bring water inside the boat.  

Which connector is most commonly used to connect printers to desktop pc systems?

Answers

USB 2.0 is the most common now. it used to be Firewire 800


NEED HELP ASAP!
FLASH FLOODS CAN CAUSE VEHICLES TO FLOAT AND FILL WITH WATER, TRAPPING AND DROWNING PEOPLE. WHILE ESPECIALLY DANGEROUS AT NIGHT AND IN DEEP WATER, EVEN ____ INCHES OF WATER CAN FLOAT SOME SMALL CARS.

Answers

Six inches is the answer

An instruction book or program that takes users through a prescribed series of steps to learn how to use a program is called (a) ________.

Answers

Manual

An instruction book or program that takes users through a prescribed series of steps to learn how to use a program is called a manual.

What type of electronic monitoring involves an offender being contacted periodically by telephone or beeper to verify his or her whereabouts?

Answers

The type of electronic monitoring that involves an offender being contacted periodically by telephone or beeper to verify his or her whereabouts is called the programmed contact. It is a method used in investigations to monitor the offender in a certain situation where he is forced to remain.

A(n) ____ window is an open window hidden from view but that can be displayed quickly by clicking the window's app button on the taskbar.â

Answers

A minimized window :)  

Hope that helped!

Answer:

The correct answer is: minimized.

Explanation:

When a window is active (the corresponding button is selected in the taskbar), clicking on its button in the taskbar minimizes the window. This means that the window disappears from the desktop. When a window is minimized, its content is not closed or deleted, it is simply temporarily removed from the desktop. In the previous image; are minimized, Excel and Windows Media Player but are still running, as their respective buttons appear in the taskbar. You can also minimize a window by clicking the Minimize button located in the upper right corner of the window.

To restore a minimized window - that is, to display it again on the desktop - click its button on the taskbar. For more information about these buttons, see Windows help and support.

Which adapter card in a pc would provide data fault tolerance?

Answers

The adapter cards add extra functionality to a computer and are designed for a specific task. There are several typed of adapter cards: Input/Output cards, Storage Controllers, Sound Cards,Graphic cards,...
A RAID (Redundant Array of Independent Diskscard) (or RAID controller) is an adapter card in a PC that provides data fault tolerance. It controls the expansion of internal and external drives so they can work as a single logical unit and provides fault tolerance for storage devices

Which feature in word automatically corrects typos, minor spelling errors, and capitalization as you type? autocomplete spelling and grammar autocorrect autotype?

Answers

I think auto correct.....,

A ________ attack disables a computer system or network by making so many requests of it that it overloads it and keeps other users from accessing it.

Answers

The answer is denial of service. In this process, it makes a user access and have a lot of things to process because of the request that is being laid out. If the request has not been successful, it would likely make the user to have no ability of accessing the system which we can say is related to the given description above.

What is the important safety information found on a boat's capacity plate?

Answers

Written on the boat capacity plate that is important for every captain or owner must be knowledgeable about is the maximum allowable total weight and number of passengers. This is to avoid untoward accident due to over capacity and a ticket for unsafe operation by law enforcements. 

What is a functionalist perspective of cell phones, internet and personal computers?

Answers

As these technologies are rapidly evolving a functionalist would say that they unbalance the equilibrium of the social state, and is therefore undesirable as there is more interaction and adaptation of habits from other societies. But they also say that it's not a good thing to change immediately because it might disrupt the society. Therefore it has to change slowly. 

What is the significance of the vertical columns of the periodic table? what is the significance of the horizontal rows?

Answers

Yes, horizontal rows are periods. “All of the elements in a period have a similar number of atomic orbitals. Each element in the top row (the principal time frame) has one orbital for its electrons. The greater part of the components in the second column (the second time frame) has two orbitals for their electrons. It goes down the occasional table that way. As of now, the most extreme number of electron orbitals or electron shells for any element is seven."

The vertical columns are groups. "The elements in a group have the same number of electrons in their outer orbital [and thus the same charge]. Every element in the first column (bunch one) has one electron in its external shell. Each element on the second segment (assemble two) has two electrons in the external shell. As you continue tallying the segments, you'll know what numbers of electrons are in the external shell.

The database management system is a program used to create, process, and administer a database.
a. True
b. False

Answers

The Answer is True.

You want to plug a keyboard into the back of a computer. you know that you need to plug the keyboard cable into a ps/2 port. which style of port is the ps/2?

Answers

Often referred to as the mouse port or keyboard port, the PS/2 port was developed by IBM and is used to connect a computer mouse or keyboard to an IBM compatible computer. Its name originates from the IBM Personal System/2 arrangement of PCs, with which it was propelled in 1987.

What is the second step in opening the case of a working computer?

Answers

The steps of opening the case of a working computer as follows:
1- power off the device
2- unplug its power cable
3- detach all the external attachments and cables from the case
4- Remove the retaining screws of the side panel
5- Remove the case's side panel

So, the answer to your question is : unplug its power cable.

Final answer:

The second step in opening a computer case involves ensuring the computer is turned off and disconnected from any power source, followed by removing all cables.

Explanation:

The second step in opening the case of a working computer typically involves preparing the computer to be safely opened. Prior to opening the case, ensure that the computer is turned off and disconnected from any power source to avoid electric shock or damaging the components. After confirming the computer is powered down, you usually need to remove any cables connected to it, including the power cable, and place the computer on a stable, flat surface. Looking at various contexts, the second step may vary, but safety and disconnection from power are the key concerns before opening a computer case.

Name the first programming language that fully supported object oriented programming.

Answers

I believe that it was SmallTalk. It was back around 1967.
Other Questions
The nurse researcher is using a nursing degree as a variable in a research study. the level of measurement most appropriate in this case is what? What would a good digital citizen do in the following situation? Nick sees that his classmate left her email account open on a school computer by mistake. Nick decides to _____.Question 1 options:send an email from her account to a friendlog out of her email and let her know that he closed it for hernot do anything and let someone else deal with itdelete all of her emails Mrs. Ming invested an amount of money in two accounts for one year. She invested some at 8% interest and the rest at 6% interest. Her total amount invested was $1,500. At the end of the year, she had earned $106.40 in interest. How much had Mrs. Ming invested in the account paying 6%? $117 $680 $760 $820 How does government usually protect its national sovereignty? Slovakia is a land locked country, surrounded by 5 other countries. _____ t enviar fotos por el internet?a. sirvesb. conocesc. pidesd. sabes 2. In what type of organization is sequence extremely important? USING SEMICOLONS AND COLONS CORRECTLY Correct the punctuation in the following sentences by re-writing the sentence, adding semicolons and colons where they are needed and by changing other punctuation and capitalization as needed.You may not recognize Esther Pauline Friedman Lederers name you have probably read, however, the column she writes under her pen name, Ann Landers. The equation A=p(1+r)^t can be used to calculate compound interest on a savings account. A = future balance, p = current balance, r = rate of interest, and t = time in years. If you deposit $2,000 at 10% each year, how much money will be in your account in 10 years . Suppose you're using an operant conditioning approach to teach someone how to use a bow and arrow.You begin by teaching your student how to hold a longbow. Then you show him how to maintain balancewhile holding the bow. Finally, you show him how to aim and properly release the arrow toward a target atthe correct moment. This operant conditioning approach is calledA. partial reinforcement.B. shaping.C. programmed learning.D. approximation. what decreased alertness, slurred speech, drowsiness, and depressed respiration are common side effects of what ? When a client is a receiving a continuous intravenous infusion of heparin 1,000 u/hr, what should the nurse do? Which is the most likely reason that stem cell research is controversial? 20% of the global populations live in the richest countries. what percentage of primary energy is used by this global population Which solution below has the highest concentration of hydroxide ions?a.ph = 3.21b.ph = 12.6c.ph = 7.93d.ph = 9.82e.ph = 7.00? The coordinates of ABCABC are A(12,8), B(10,18), C(4,16)A(12,8), B(10,18), C(4,16). After a dilation, the coordinates are A'(6,4), B'(5,9), C'(2,8)A(6,4), B(5,9), C(2,8). Find the scale factor. What is the tactic in which Congress changes a bill to sneak in unapproved spending or overspending on programs when a bill is marked up One of the long-reaching effects of the Spanish conquest was the spread of what religion across the Americas? Buddhism Hinduism Catholicism Protestantism Es la comida ms importante del da. son los ms ricos de toda la ciudad. porque es el menos caro de los pescados del men. , el camarero me ofreci la peor mesa de todas. . nadia, la mayor de las hermanas, es muy simp In which type of external bleeding is less likely to clot? Steam Workshop Downloader