Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using

A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.

Answer: B

Business

You might also like to view...

The common stock of Up-Towne Movers sells for $33 a share, has a rate of return of 11.4 percent, and a dividend growth rate of 2 percent annually. What was the amount of the last annual dividend paid?

A. $2.58 B. $2.61 C. $3.04 D. $3.32 E. $3.10

Business

In a high-context culture, the situation is more important than the written word

Indicate whether the statement is true or false.

Business