A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge

A) rootkit B) logic bomb
C) denial of service (DoS) D) zombie

A

Computer Science & Information Technology

You might also like to view...

A common email protocol that allows email to be stored on only one device is _____

Fill in the blank(s) with correct word

Computer Science & Information Technology

C# is .

a) event-driven b) a visual programming language c) fully object-oriented d) All of the above.

Computer Science & Information Technology