Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
Answer: B
Business
You might also like to view...
The common stock of Up-Towne Movers sells for $33 a share, has a rate of return of 11.4 percent, and a dividend growth rate of 2 percent annually. What was the amount of the last annual dividend paid?
A. $2.58 B. $2.61 C. $3.04 D. $3.32 E. $3.10
Business
In a high-context culture, the situation is more important than the written word
Indicate whether the statement is true or false.
Business