________ is the modification of data by altering accounts or database records so that it is difficult or impossible to tell that the accounts have stolen funds or equipment.

a. Forgery
b. Data diddling
c. Salami shaving
d. Shilling

Ans: b. Data diddling

Computer Science & Information Technology

You might also like to view...

After adding buttons to a form, you can change the formatting using what button?

A) Conditional Formatting B) Change Shape C) Button D) Quick Styles

Computer Science & Information Technology

When security vulnerabilities are detected in Linux, it's up to ____ to find a solution.

A. IBM B. Microsoft C. McAfee Security D. development and user communities

Computer Science & Information Technology