A ________ program gathers usernames, passwords, or credit card numbers when they are entered into a computer
A) bot B) keylogger C) rootkit D) computer zombie
B
Computer Science & Information Technology
You might also like to view...
The first line of a document in ________ style is the name of the person writing the report
A) The Gregg Reference Manual B) parenthetical citation C) MLA D) APA
Computer Science & Information Technology
____________________ content allows an element to contain both parsed character data and child elements.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology