A set of unauthorized computer instructions in an otherwise properly functioning program is known as a
A) logic bomb.
B) spyware.
C) trap door.
D) Trojan horse.
D
Business
A) logic bomb.
B) spyware.
C) trap door.
D) Trojan horse.
D