A zombie computer happens when the remote-controlled Trojan horse leaves hidden codes into a system that allows the hacker to control the computer using a remote. Hackers rely on various robot networks that help in creating the zombie computers so that they can do bad things.
It’s like going to someone’s house, and leaving a remote-controlled camera, or robot in the house.