________, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.
A. Worms
B. Trojans
C. Hotspots
D. Botnets
Answer: D
Computer Science & Information Technology
You might also like to view...
You can promote your Page on the Facebook site, by purchasing Facebook marketing credits
Indicate whether the statement is true or false
Computer Science & Information Technology
What is a suggested location to store templates on the hard drive?
A) Office Templates folder in the Document Templates folder B) Custom Office Templates folder in the Document Templates folder C) Custom Office Templates folder in the Documents folder D) Office Templates folder in the Documents folder
Computer Science & Information Technology