Question

What type of unsolicited internet message records the URLs visited and keystrokes used? a.      Virus b.    ...

What type of unsolicited internet message records the URLs visited and keystrokes used?

a.      Virus

b.     Grayware

c.      Spam

d.     Spyware

Answer: (Full answer with the leading Letter)

Support: (Minimum of 75 words)

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer: d.Spyware

Explanation:

Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundledas a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.

Spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else. A common way to become a victim of spyware is to download certain peer-to-peer file swapping products that are available today.

Aside from the questions of ethics and privacy, spyware steals from the user by using the computer's memory resources and also by eating bandwidth as it sends information back to the spyware's home base via the user's Internet connection. Because spyware is using memory and system resources, the applications running in the background can lead to system crashes or general system instability

Add a comment
Know the answer?
Add Answer to:
What type of unsolicited internet message records the URLs visited and keystrokes used? a.      Virus b.    ...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Question 21 According to Internet security experts, approximately 90% of all e-mail messages are spam (unsolicited...

    Question 21 According to Internet security experts, approximately 90% of all e-mail messages are spam (unsolicited commercial e-mail), while the remaining 10% are legitimate. A system administrator wishes to see if the same percentages hold true for the e-mail traffic on her servers. She randomly selects e-mail messages and checks to see whether or not each one is legitimate. (Unless otherwise specified, round all probabilities below to four decimal places; i.e. your answer should look like 0.1234, not 0.1234444 or...

  • 1) Is this DNS message a query or response? 2) What is the port number used...

    1) Is this DNS message a query or response? 2) What is the port number used to send the DNS query? 3) How many Answer RRs? (2 point) Please describe what they are? IP, UDP and DNS 1... ....... Please check the screenshot below and give a short answer for the following questions. > Internet Protocol Version 4, Src: 168.26.188.11, Dst: 168.27.170.110 > User Datagram Protocol, Src Port: 53, Dst Port: 55706 Domain Name System (response) [Request Tn: 2101 [Time:...

  • Spam Filters* Spam filters try to sort your incoming e-mails, deciding which are real messages and...

    Spam Filters* Spam filters try to sort your incoming e-mails, deciding which are real messages and which are unwanted. One method used is a point system. The filter reads each incoming e-mail and assigns points according to the sender, the subject, key words in the message, and so on. The higher the point total the more likely it is that the message is unwanted. The filter has a cutoff value for the point total; any message rated lower than that...

  • e. Security risk analysis d Access restrictions e Monitoring log-in activity 23This securi ecurity measure records...

    e. Security risk analysis d Access restrictions e Monitoring log-in activity 23This securi ecurity measure records Virus protection software is b stivity of a sor within sowa Audit trails Security risk analysis d Access restrictions c. Monitoring log-in activity 24. This security measure monitors ir hackers are attempting to break into be locked a Virus protection software b. Audit trails c. Security risk analysis d. Access restrictions e. Monitoring log-in activity autempting to break into the network and accounts can...

  • 46. What application software is used to manage data like budgets? a. Word processing software b....

    46. What application software is used to manage data like budgets? a. Word processing software b. Spreadsheet software c. Telecommunication software d. Electronic health record software e. Antimalware software 47. A medical assistant needs to send a letter informing a patient about her test results. What type mail service should be used? a. Priority Mail Express b. Priority Mail c. First-Class Mail d. Certified Mail e. Registered Mail the medical assistant must A medical assistant needs to send a termination...

  • HIV is a retrovirus (a virus that uses reverse transcriptase). a. What is reverse transcriptase? b....

    HIV is a retrovirus (a virus that uses reverse transcriptase). a. What is reverse transcriptase? b. How is a retrovirus different from other viruses? c. How does a retrovirus infect a cell and reproduce itself? 2. Review of the immune system. a. What is a T cell? b. What varieties of T cell exist? How are they functionally different? c. What are their roles in the human body? d. How is each T cell variety differentiated from the others (molecularly)?...

  • please help with C, D and E and explain how you got your answers. Indicates a required field. FORUM DESCRIPTION Dire...

    please help with C, D and E and explain how you got your answers. Indicates a required field. FORUM DESCRIPTION Directions: answer the following questions in detail. Acetone, is a clear liquid solvent with an acrid odor, is used to remove nail polish, paints, and resins. It has a low boiling point and is highly flammable. Acetor g/mL a. What is the molecular formula of acetone? b. What is the molar mass of acetone? c. Identify the bonds C-C, C-H,...

  • 6) A massless turntable is used to play records. Each record is essentially a solid cylinder with...

    6) A massless turntable is used to play records. Each record is essentially a solid cylinder with a radius of 0.15 m and mass 0.1 kg. There is a constant frictional force of 0.5 N due to a wire rubbing against the record a distance of 0.05 m from the axis of rotation. Answer the following questions assuming that you apply a tangential force on the record with your finger at a distance of 0.1 m from the axis of...

  • What type of network access mechanism is used in wireless systems to connect to the network?...

    What type of network access mechanism is used in wireless systems to connect to the network? Group of answer choices A. Carrier Sense Multiple Access – General (CSMA) B. Carrier Sense Multiple Access with collision detection (CSMA/CD) C. Carrier Sense Multiple Access with collision avoidance (CSMA/CA) D. Wireless Management Access System (WMAS) E. None of the above

  • Write a C++ program named, gradeProcessor.cpp, that will do the following tasks: -Print welcome message -Generate...

    Write a C++ program named, gradeProcessor.cpp, that will do the following tasks: -Print welcome message -Generate the number of test scores the user enters; have scores fall into a normal distribution for grades -Display all of the generated scores - no more than 10 per line -Calculate and display the average of all scores -Find and display the number of scores above the overall average (previous output) -Find and display the letter grade that corresponds to the average above (overall...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT