When a computer criminal gains access to a system by searching through discarded records, this is referred to as
A) data diddling.
B) dumpster diving.
C) eavesdropping.
D) data squatting.
B
Business
You might also like to view...
Which of the following statements is true if a bond's stated interest rate is the same as the market rate?
A) The bond will be issued at a premium. B) The bond will be issued at par. C) The bond will be issued at a discount. D) The bond will be issued for an amount lower than the maturity value.
Business
Cause-and-effect diagrams are also known as
A. flowcharts. B. fish-bone charts. C. target specification graphs. D. Pareto charts.
Business