By using password-stealing software, ________ capture what is typed on a keyboard and can easily obtain personal information

A) identity thieves B) cyberstalkers C) hackers D) keyloggers

D

Computer Science & Information Technology

You might also like to view...

Flipping an image and rotating an image are the same thing

Indicate whether the statement is true or false

Computer Science & Information Technology

________ control the layout, background design, and color combination of handouts, notes pages, and slides

Fill in the blank(s) with correct word

Computer Science & Information Technology