Which of the following seeks to get information from your computer and make it available to some other person?

A) Spyware
B) Viruses
C) Adware
D) Trojan horses

A) Spyware

Computer Science & Information Technology

You might also like to view...

Bullet points are organized in ________ levels similar to an outline

A) item B) detail C) list D) priority

Computer Science & Information Technology

_____ just above the header row of an Excel table to select the column data but not the header.

A. Click B. Double-click C. Triple-click D. Right-click

Computer Science & Information Technology