The unauthorized use of special program that bypass regular system controls to perform illegal acts is called

A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.

Answer: D

Business

You might also like to view...

Waving signs at passing cars is a form of

a. Direct sales b. Guerilla marketing c. Telemarketing d. Direct response advertising

Business

MRP II is accurately described as:

A) MRP software designed for services. B) MRP with a new set of computer programs that execute on microcomputers. C) material resource planning. D) an enhancement of MRP that plans for all levels of the supply chain. E) a new generation of MRP software that extends MRP to planning and scheduling functions.

Business