________ is the modification of data by altering accounts or database records so that it is difficult or impossible to tell that the accounts have stolen funds or equipment.
a. Forgery
b. Data diddling
c. Salami shaving
d. Shilling
Ans: b. Data diddling
Computer Science & Information Technology
You might also like to view...
After adding buttons to a form, you can change the formatting using what button?
A) Conditional Formatting B) Change Shape C) Button D) Quick Styles
Computer Science & Information Technology
When security vulnerabilities are detected in Linux, it's up to ____ to find a solution.
A. IBM B. Microsoft C. McAfee Security D. development and user communities
Computer Science & Information Technology