A set of unauthorized computer instructions in an otherwise properly functioning program is known as a

A) logic bomb.
B) spyware.
C) trap door.
D) Trojan horse.

Answer: D

Business

You might also like to view...

Restrictions on the transfer of shares in a close corporation are usually void

Indicate whether the statement is true or false

Business

Which of the following is NOT an example of a financial asset?

a. convertible bond b. certificate of deposit c. preferred stock d. inventory e. mutual fund

Business