The unauthorized use of special program that bypass regular system controls to perform illegal acts is called
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
Answer: D
Business
You might also like to view...
Waving signs at passing cars is a form of
a. Direct sales b. Guerilla marketing c. Telemarketing d. Direct response advertising
Business
MRP II is accurately described as:
A) MRP software designed for services. B) MRP with a new set of computer programs that execute on microcomputers. C) material resource planning. D) an enhancement of MRP that plans for all levels of the supply chain. E) a new generation of MRP software that extends MRP to planning and scheduling functions.
Business