Developers of computer systems often include a user name and password that is hidden in the system, just in case they need to get into the system and correct problems in the future. This is referred to as a
A) Trojan horse.
B) key logger.
C) spoof.
D) back door.
Answer: D
Business
You might also like to view...
All the PR benefits a firm receives without having directly paid for anything is called ________ media
A) earned B) open C) passive D) inherent E) internal
Business
You should use prototypes to ___________________ on writing a document
a. develop personal strategies b. monitor your progress c. verify that you are actually working d. exchange information
Business