1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-s [515]
3 years ago
7

____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to pa

rticipate in an attack.
Computers and Technology
2 answers:
Talja [164]3 years ago
6 0

Answer: Zombies

Explanation: Zombie is a computer device that is responsible for the compromising the system and making it prone to several destruction such as the Trojan horse virus,hackers and other viruses as well. Zombie makes the computer system to get malfunctioned easily ,that is without much security and various malicious functions can be performed.They basically act as the infected computer .

yuradex [85]3 years ago
4 0

Answer:

The options for this question are the following:

A) Drones

B) Helpers

C) Zombies

D) Servants

The correct answer is C) Zombies

Explanation:

In computing, a zombie is a computer connected to the network that has been compromised by a hacker, a computer virus or a Trojan. It can be used to perform various malicious tasks remotely.

Most zombie computer owners are not aware that their system is being used in this way, hence the comparison with the walking dead. In addition, they are used in DDoS attacks coordinated with multiple botnet machines that resemble zombie horde attacks, such as those that appear in horror movies.

You might be interested in
Which type of service offers a preconfigured testing environment for application developers to create new software applications?
Vaselesa [24]

A type of service which offers a preconfigured testing environment for application developers to create new software applications is: B - Platforms as a Service (PaaS).

<h3>What is cloud computing?</h3>

Cloud computing can be defined as a type of computing service that requires the use of shared computing resources over the Internet, rather than the use of local servers and hard drives.

<h3>The categories of cloud service.</h3>

Generally, cloud computing comprises three (3) service models which includes the following;

  • Infrastructure as a Service (IaaS).
  • Software as a Service (SaaS).
  • Platform as a Service (PaaS).

In conclusion, a type of service which offers application developers a preconfigured hosting and testing environment to create new software applications is Platforms as a Service (PaaS).

Read more on Platform as a Service here: brainly.com/question/24233315

#SPJ1

6 0
2 years ago
____ is used specifically for the purpose of recording keystrokes, logging the programs or Web sites accessed, or otherwise moni
insens350 [35]

Answer:

Computer monitoring software

Explanation:

Computer monitoring software is used specifically for the purpose of recording keystrokes, logging the programs or Web sites accessed, or otherwise monitoring someone’s computer activity.

4 0
3 years ago
Read 2 more answers
Why is it hard for some people to keep a promise even one that they make to themselves​
tresset_1 [31]

Answer:

Awww what happened? Sometimes its hard for me to keep a promise.

Explanation:

7 0
3 years ago
Read 2 more answers
What is an optical drive used for?​
solong [7]

Optical Disc Drive (ODD) An optical disc drive (ODD)

for using CDs, DVDs, and Blu-ray discs to listen to music or watch a movie.

Most drives also allow you to write data to a disc, so you can create your own music CDs, video DVDs or even create of back-up copy of your important data files.

dell.com

4 0
2 years ago
Read 2 more answers
What is the result of a network technician issuing the command ip dhcp excluded-address 10. 0. 15. 1 10. 0. 15. 15 on a cisco ro
Hunter-Best [27]
The answer to this question is 83774838473773
3 0
2 years ago
Other questions:
  • it is important to include the __ attribute of the tag because some people use text-only web browsers
    5·2 answers
  • Which of the following is least likely checked by the comprehensive component monitor?
    7·1 answer
  • Can someone explain a cylinder
    7·1 answer
  • Value or power of a network grows exponentially as a function of the number of network members. this is known as ________ law.
    8·1 answer
  • A(n) ____ is an entry in a cell that contains text such as "2016 Sales" or "Travel Expenses."
    10·1 answer
  • Many contemporary languages allow two kinds of comments: one in which delimiters are used on both ends (multiple-line comments),
    7·1 answer
  • We will cover email use and management. Training topics include:
    5·1 answer
  • It is believed that Taiwan is the original home of these early Oceania explorers. Maori Lapita Polynesians Aborigines
    13·2 answers
  • What is software and explain the five types of software
    5·2 answers
  • Question 1 of 10 Which type of information systems personnel are involved in organizing information so that users can access it
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!