A computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
A. adware
B. digital certificate
C. grayware
D. keylogger
E. dictionary attack
F. social engineering
G. tailgating
H. Trojan
I. zombie
J. worm
zombie
You might also like to view...
The ________ task pane tracks all of the objects that display on a slide
A) Slide B) Object C) Selection D) Layout
The element is an empty element
Indicate whether the statement is true or false
?The purpose of studying a system is to identify the strengths and weaknesses of the existing system and examine current inputs, outputs, processes, security and controls, and system performance.
Answer the following statement true (T) or false (F)
PMPs are mostly of two types, music and media players but much of what they can do can also be done on _____
A. Tablets B. Smartphones C. laptops D. all of those