Top Posters
Since Sunday
5
a
5
k
5
c
5
B
5
l
5
C
4
s
4
a
4
t
4
i
4
r
4
New Topic  
JoniJnm JoniJnm
wrote...
Posts: 617
Rep: 0 0
6 years ago
In computer security, compromised computers that act under the direction of an external master computer, often to send spam, are called ________.
Textbook 
Fluency With Information Technology

Fluency With Information Technology


Edition: 6th
Author:
Read 50 times
2 Replies
Replies
Answer verified by a subject expert
LeedsVikingLeedsViking
wrote...
Posts: 426
6 years ago
Sign in or Sign up in seconds to unlock everything for free
More solutions for this book are available here
1

Related Topics

JoniJnm Author
wrote...
6 years ago
been helpful all year long

pm me your paypal, least i could do
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  1351 People Browsing
Related Images
  
 281
  
 776
  
 4294
Your Opinion
Which country would you like to visit for its food?
Votes: 204