When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually referred to as which of the following?

A. viruses
B. zombies
C. macros
D. cyborgs


Answer: B

Computer Science & Information Technology

You might also like to view...

The Step Into debugger command can be used to __________.

a) return from the method to the caller b) modify the code at execution time to correct a logic error c) execute the code statements in a different order to locate a bug d) view the code for a called method as it executes

Computer Science & Information Technology

Many of the functions that a laptop can perform can be accomplished on a tablet

Indicate whether the statement is true or false

Computer Science & Information Technology

The To value box in the Goal Seek dialog box contains ________

A) a cell reference from the formula that can be adjusted to achieve the goal B) a formula C) the result desired for the formula D) a function

Computer Science & Information Technology

When is it okay to touch the inside of a computer that is turned on?

A. When disassembling the computer B. When using a multimeter to measure voltage output C. When reassembling the computer D. When a qualified electronics expert or electrician is present

Computer Science & Information Technology