A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge
A) rootkit B) logic bomb
C) denial of service (DoS) D) zombie
A
Computer Science & Information Technology
You might also like to view...
A common email protocol that allows email to be stored on only one device is _____
Fill in the blank(s) with correct word
Computer Science & Information Technology
C# is .
a) event-driven b) a visual programming language c) fully object-oriented d) All of the above.
Computer Science & Information Technology