A set of unauthorized computer instructions in an otherwise properly functioning program is known as a
A) logic bomb.
B) spyware.
C) trap door.
D) Trojan horse.
Answer: D
Business
You might also like to view...
Restrictions on the transfer of shares in a close corporation are usually void
Indicate whether the statement is true or false
Business
Which of the following is NOT an example of a financial asset?
a. convertible bond b. certificate of deposit c. preferred stock d. inventory e. mutual fund
Business