…………. is a type of malware that is installed on a user’s computer and collects information about user without their consent and knowledge. -Technology

1 Answer

Answer :

Spyware is a type of malware that is installed on a user’s computer and collects information about user without their consent and knowledge.

Related questions

Description : It allows a visited website to store its own information about a user on the user’s computer. -Technology

Last Answer : (iii) Cookies

Description : Spyware is a type of malware but is not capable of collecting personal information. -Technology

Last Answer : False Spyware is a type of malware used to collect personal information without his or her knowledge.

Description : computer system without the owner’s informed consent. (a) Blog -Technology

Last Answer : (d) Malware designed to interrupt ongoing computer operations, collect private information and gain unauthorized access to your system resources.

Description : Which one of the following is not a malware? (a) Computer virus (b) Spam -Technology

Last Answer : (d) Application software refers to the condition in which your computer stops working.

Description : A mail or message sent to a large number of people indiscriminately without their consent is called ..... -Technology

Last Answer : A mail or message sent to a large number of people indiscriminately without their consent is calledspam.

Description : ……. and ………. are the two types of malware. -Technology

Last Answer : Viruses and wormsare the two types of malware.

Description : What is ‘net neutrality’? (1) Internet Service Providers and governments should treat all data on the internet equally (2) Piracy in internet must be curbed (3) Internet users must give out balanced opinions in social media sites (4) Internet should be kept free from malware and virus

Last Answer :  Internet Service Providers and governments should treat all data on the internet equally

Description : Mr. X has recently installed a new operating system on his computer 1. Describe the main functions of an operating system. -Technology

Last Answer : 1. Monitors the performance of the system, enables software to communicate with hardware and application softwares to be loaded; gives prompts and error reports to the users.2. Antivirus and compression tool.

Description : Suchi has recently installed a new operating system on her computer. 1. Describe the main functions of an operating system. -Technology

Last Answer : 1. Monitors the performance of the system, enables software to communicate with hardware, enables applications, software to be loaded; gives prompts and error reports to the users.2. Command-driven user interface means CUI, by which a user gives instructions via typing command onto the computer.

Description : Amit installed an antivirus software to remove all the viruses from his computer. -Technology

Last Answer : 1. Antivirus software is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them.2. Two actions performed by an antivirus ... ) Scanning and monitoring files and folders on your computer to ensure that they are not infected.

Description : The at first glance will appear to be useful software but will actually do damage once installed or run on your computer. -Technology

Last Answer : (c) The Trojans are unauthorized programs placed inside a legitimate application.

Description : When an organisation attempts to control its marketing activities, it may find it difficult to A)determine their effect on sales volume. B)use the information it collects. C)obtain the necessary information. D)get the accounting department to co-operate.

Last Answer : C)obtain the necessary information

Description : Information and other resources can be modified only by those users, -Technology

Last Answer : Security and Integrity of information ensures that information and other resources are modified only by those users, who have the authority of making changes in the data.

Description : What are different users’ approach to information? -Technology

Last Answer : The different users’ approach to information are:i. Everyday Approach;ii. Comprehensive or Exhaustive Approach; andiii. Current Approach.

Description : An LCD monitor allows the user to input information, by touching the icons on the screen. -Technology

Last Answer : FalseBecause most of the LCD monitors do not come with touch facility where information is provided by touching the icons.

Description : How can the user determine what programs are available on a computer? 1) Checking the hard disk properties 2) Viewing the installed programs during the booting process 11 3) Checking the operating system ... of installed programs. 4) Checking the existing files saved on the disk 5) None of these

Last Answer : Answer :4

Description : Compaq Computers collects information about political, legal, regulatory, societal, VU Cafeteria economic, competitive and technological forces that may affect its marketing activities. This ... scanning B)survey of environment C)marketing information analysis D)environmental analysis

Last Answer : D)environmental analysis

Description : Which of the following statements does not describe a condition that creates a demand for auditing? a. Users can directly assess the quality of information. b. Information can have substantial ... verification. d. Conflict between an information preparer and a user can result in biased information

Last Answer : Users can directly assess the quality of information.

Description : Which one of the following is not a reason why the users of financial statements desire for an independent assessment of the financial statement presentation? a. Complexity of transactions affecting the ... c. Remoteness of the user from the organization d. All of them are potential reasons

Last Answer : Lack of criteria on which to base information

Description : The need for assurance services arises because: a. There is a potential bias in providing information. b. Economic transactions are less complex than they were a decade ago. c. There is a consonance ... . d. Most users today have access to the system that generates the financial statements they use

Last Answer : There is a potential bias in providing information

Description : A CPA in public practice shall not disclose any confidential client information without the specific consent of the client. The confidentiality rule is violated if CPA disclosed information without client' ... s largest stockholder. d. Complaint filed with the trial board of the Board of Accountancy

Last Answer : Request by client's largest stockholder.

Description : Without the consent of the client, a CPA should not disclose confidential information contained in working papers to a: a. Voluntary quality control review board. b. CPA firm that has purchased the ... . c. National court that has issued a valid subpoena. d. Disciplinary body created under statute.

Last Answer : CPA firm that has purchased the CPA’s accounting practice.

Description : Which of the following statements concerning a CPA's disclosure of confidential client information is ordinarily correct? a. Disclosure should not be made even if such disclosure will protect the CPA's ... consent of the client. d. Disclosure may be made to any government agency without subpoena.

Last Answer : Disclosure may be made to any party on consent of the client.

Description : Can any person with information about a sexual harassment incident file a complaint to the Complaints Committee? a) Yes, only with written consent of the complainant b) Yes, even without written consent of the complainant c) No 

Last Answer : a) Yes, only with written consent of the complainant

Description : ……….. is a real_time communication between two or more users via computer. -Technology

Last Answer : Chatis a real-time communication between two or more users via computer.

Description : GUI has become a standard way of how to users interact with a computer? Its one feature is WYSIWYG. -Technology

Last Answer : 1. GUI Graphical User Interface WYSIWYG What You See Is What You Get.2. GUI contains icons that represent files, folders and other applications.

Description : Out of the following, whom do you think is the most probable user of a Light Pen? (a) Computer Programmer (b) Graphic Designer (c) Journalist -Technology

Last Answer : (b) Light pen is useful for graphic designer as it is useful for identifying a particular location on the screen.

Description : An operating system of a computer serves as a software interface between the user and the (a) hardware (b) peripheral -Technology

Last Answer : (a) An operating system of a computer serves as a software interface between the user and the hardware.

Description : …………. is a program interface that enables a user to communicate with computer through graphics or symbols. -Technology

Last Answer : GUI (Graphical User Interface) is a program interface that enables a user to communicate with computer through graphics or symbols.

Description : . What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What part of the computer collects data from people and devices?

Last Answer : Input devices connect to the computer and they pass data intothe Processor where it can be processed.

Description : Which type of tags used by HTML? (a) tags only for image (b) user defined tags -Technology

Last Answer : (d) HTML provides predefined and fixed tags.

Description : ………….. is the rectangular area of the document window, where user can type his/her content. -Technology

Last Answer : Work area or Work spaceis the rectangular area of the document window, where user can type

Description : Automatic formatting that the user wants? (a) Replace text As You Type (b) AutoFormat As You Type -Technology

Last Answer : (b) For turning Automatic formatting On or Off, AutoFormat As You Type tab under Proofing is used.

Description : Your task is to install an additional application server for an SAP system Which rule applies for the installation work? A. The additional application server has to be installed on a ... additional application server has to be identical to the instance number of the primary application server.

Last Answer : A. The additional application server has to be installed on a separated host from the primary application server

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : 1) large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1 large numbers of users direct access to the computer for problem solving 2 large number of user for file sharing 3 both of above 4 none

Last Answer : 1 large numbers of users direct access to the computer for problem solving

Description : Question about computer anti-virus/malware (please see details inside).

Last Answer : I can’t help you but sent it on to three who should be able to.

Description : How does malware infect a computer?

Last Answer : You download a program that seems legit but is infact infected. Common ones are browser toolbars and animated mouse cursors. but free games, task bar applications, etc. you need a virus blocker and ... software says not to downlaod something, DO NOT turn off the software so you can download it.

Description : If I use Mozilla Firefox will my computer still get viruses, and if so, how can I check my computer for viruses and malware?

Last Answer : Try some anti-virus software and scan your computer… AVG has a nice free anti-virus… I also recommend Norton… Just run the scan , and it will scan for anything that may be possible as a virus…

Description : Why am i recieving fake malware attacks on my computer?

Last Answer : Looks like your ship is wrecked in sand. Sorry, but I have a Mac.

Description : How would I clean my computer of malware and spyware?

Last Answer : answer:Back up all the files on CD’s or an external HDD. Then re-install the operating system. Then move the files back onto the computer. I’m thinking this is much easier to do on a Mac than on a Windows Machine. That’s the best way to get a completely clean computer.

Description : How to Scan Your Computer for a Virus, Malware, or Adware for Free Online?

Last Answer : It's almost inevitable for those folks who spend a great deal of their time checking out the latest news, funny videos, Facebook updates or Farmville crop rotations that a small virus or ... the years to include one of the most comprehensive virus databases while retaining the speed and efficie

Description : In preparation for developing the acceptance criteria, the user should A. Know the defects in the application B. Acquire the basic knowledge of the application for which the system is ... D. Know new enhancement and basic understanding of how the application is implemented in users organization

Last Answer : Understand the risks and benefits of the development methodology that is to be used in correcting the software system

Description : Can the DCF or police talk to a minor without the parent's consent or knowledge?

Last Answer : I would think they can but you might want to consult a lawyer about it.

Description : Programs that ask servers for services are called (a) users (b) hosts -Technology

Last Answer : (c) In the client-server model, the client is a piece of hardware/software that ask servers for services.