A ________ program gathers usernames, passwords, or credit card numbers when they are entered into a computer

A) bot B) keylogger C) rootkit D) computer zombie

B

Computer Science & Information Technology

You might also like to view...

The first line of a document in ________ style is the name of the person writing the report

A) The Gregg Reference Manual B) parenthetical citation C) MLA D) APA

Computer Science & Information Technology

____________________ content allows an element to contain both parsed character data and child elements.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology