A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
A. denial of service (DoS)
B. zombie
C. logic bomb
D. rootkit
Answer: D
Computer Science & Information Technology
You might also like to view...
When you select other users to follow, you receive all their tweets on your Twitter home page
Indicate whether the statement is true or false
Computer Science & Information Technology
When using date data, the date is surrounded by ________
A) parentheses ( ) B) pound signs # # C) brackets [ ] D) braces { }
Computer Science & Information Technology