Final answer:
A compromised computer controlled by a hacker is specifically referred to as a Zombie, which may be part of a botnet and infected with various types of malware.
Step-by-step explanation:
A computer that has been taken over by a hacker, typically by using a rootkit, is referred to as a Zombie. When a computer is compromised in such a way, it can be controlled remotely without the owner's knowledge, often to send spam emails, engage in click fraud, or participate in a distributed denial-of-service (DDoS) attack as part of a larger network of compromised computers, known as a botnet. A compromised host may contain various types of malware, but the term that specifically refers to an individual computer under the control of a hacker is 'Zombie.'