Attempt the question, check the explanation, and continue with similar questions to build confidence before exams.
Collects personal information
Locks or encrypts files for ransom
Spreads through removable storage
Monitors user activity
Video Explanation
Watch Video Solution
Login to get access
Continue with nearby questions to strengthen the same chapter concept while you still have the context fresh in mind.