The programs which were used by the hackers were ______.A.made by the hackers and put on c
The programs which were used by the hackers were ______.
A.made by the hackers and put on computers
B.not found by the experts
C.prepackaged and found on many computers
D.hard to find