blakeboy2662 blakeboy2662 23-12-2022 Computers and Technology Answered Once a computer. is installed, the attacker can gain full access to the a. worm b. botnet c. zombie d. rootkit