An infected robot computer is known as a ____.

A. zombie
B. Trojan horse
C. beachhead
D. bottle

Answer: A

Computer Science & Information Technology

You might also like to view...

What is the primary protocol that is used to mitigate Layer 2 loops?

A) CDP B) LACP C) STP D) Ethernet

Computer Science & Information Technology

A __ is a program that can replicate by attaching itself to another program.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology