kailenmarkail247 kailenmarkail247 26-08-2022 Social Studies Answered Which activity do hackers use to take control of a user's computer by creating a program that looks legitimate but is actually malicious code?