1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elis [28]
3 years ago
10

A malware-infected networked host under the remote control of a hacker is commonly referred to as:

Computers and Technology
2 answers:
natali 33 [55]3 years ago
7 0

Answer:

Option a: Trojan

Explanation:

A Trojan or Trojan horse is one of the computer malware that exist in computing world. Trojan often appears as a legitimate software to deceive user to activate it by social engineering. Once the Trojan is activated in the user computer, a hacker can remote control the infected computer for malicious purposes such as removing files, sending files, displaying message or rebooting computer.

However, Trojan cannot be replicated in the infected computer.

nekit [7.7K]3 years ago
3 0

Answer:

Option C i.e., Bot is the correct option.

Explanation:

Because the bot is also a malware the infects the whole computer system and host's network by the hackers, using the remote control by which they remotely controlled the user's system without the permission of the user for the purpose of stealing the confidential data and the information from the computer system of the user they aimed.

You might be interested in
ANSWER QUICKLY!
patriot [66]

Answer:

It is bit { measurement used to quantify computer data. }

7 0
3 years ago
What is the name of the file in which this
anyanavicka [17]

Answer:

B

Explanation:

i’m an information technology  student and as I remember we used this  name

3 0
3 years ago
In Tynker it is not possible to create a/an______.
alina1380 [7]

Answer:

IDE

Explanation:

8 0
3 years ago
Plz answer all the questions :)
AURORKA [14]

Answer:

is there multiple choice or do i have to answer from my own words??

7 0
3 years ago
Hannah receives an email from Keith, a subordinate who is about to start analyzing a market research report. Keith has never don
Oduvanchick [21]

Answer:

by writing her answers to the questions as a numbered or bulleted list

7 0
3 years ago
Other questions:
  • Need this answered quickly, 40 PTS!
    15·2 answers
  • SOMEONE PLZZ HELP ME ASAP!!
    15·2 answers
  • Observe the things at Home in which you are using binary
    7·1 answer
  • The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
    11·1 answer
  • The exception of MS Access 2007 and above files is _ and older version are _ files ​
    11·1 answer
  • Create a program that allows the user to pick and enter a low and a high number. Your program should generate 10 random numbers
    14·1 answer
  • Does technology shape society or does society shape technology?
    14·1 answer
  • Write the use of these computers.
    14·1 answer
  • 40 points
    5·2 answers
  • The ______ engine compares your entry against its database and returns a list of hits or sites that contain the keywords. (hint:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!