Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A computer abuse technique called a ____________________ involves a program that replicates itself on disks, in memory, and across networks.

(Short Answer)
4.8/5
(40)
Showing 161 - 161 of 161
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)