________, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

A. Worms
B. Trojans
C. Hotspots
D. Botnets

Answer: D

Computer Science & Information Technology

You might also like to view...

You can promote your Page on the Facebook site, by purchasing Facebook marketing credits

Indicate whether the statement is true or false

Computer Science & Information Technology

What is a suggested location to store templates on the hard drive?

A) Office Templates folder in the Document Templates folder B) Custom Office Templates folder in the Document Templates folder C) Custom Office Templates folder in the Documents folder D) Office Templates folder in the Documents folder

Computer Science & Information Technology