Which of the following seeks to get information from your computer and make it available to some other person?
A) Spyware
B) Viruses
C) Adware
D) Trojan horses
A) Spyware
Computer Science & Information Technology
You might also like to view...
Bullet points are organized in ________ levels similar to an outline
A) item B) detail C) list D) priority
Computer Science & Information Technology
_____ just above the header row of an Excel table to select the column data but not the header.
A. Click B. Double-click C. Triple-click D. Right-click
Computer Science & Information Technology