What is the name of an application program that gathers user information and sends it to someone through the Internet?

A. A virus

B. Spy bot

C. Logic bomb

D. Security patch

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. The ________ is the amount of data that a storage device can move from the storage medium to the Computer…
  2. Which of the following produces the best quality graphics reproduction?
  3. The brain of any computer system is
  4. Algorithm and Flow chart help us to
  5. ________ refers to electronic trespassing or criminal hacking.
  6. Which of the following memory medium is not used as main memory system?
  7. Which of the following computer implemented binary numbers, perform calculations using electronics and…
  8. Which is a non-standard version of a computing language?
  9. A computer consists of
  10. A Pixel is
  11. Which output device is used for translating information from a computer into pictorial form on paper.
  12. Note book, laptop, palm, hand-held computers are coming under the category of________ computer
  13. The term GIGO is related to
  14. Symbolic logic was discovered by
  15. A computer program that converts assembly language to machine language is
  16. A computer cannot 'boot' if it does not have the
  17. An approach that permits the computer to work on several programs instead of one is
  18. Which device can understand difference between data & programs?
  19. Second generation computers were developed during
  20. Which of the following is first generation of computer
  21. In what respect computers are superior to human beings?
  22. Why ABC is considered electro-mechanical computer?
  23. Office LANS, which are scattered geographically on large scale, can be connected by the use of corporate
  24. Integrated Circuits (Ics) are related to which generation of computers?
  25. Properly arranged data is called
  26. Who designed the first electronics computer ENIAC?
  27. Which of the following is not processing?
  28. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the…
  29. Who suggested Stored Program Concept
  30. One of a class of storage device devices that can access storage locations in any order is