Multiple Choice
All of the following are examples of e-crimes except:
A) employees or outsiders may change or invent data to produce inaccurate or misleading information.
B) employees or outsiders modify computer programs to create false information or illegal transactions or to insert viruses.
C) when a customer calls, a new window automatically pops up on a computer screen with the customer's information and account history.
D) unauthorized people access computer systems for their own benefit or knowledge or just to see if they can get in.
Correct Answer:

Verified
Correct Answer:
Verified
Q2: Traditionally, users have purchased software licenses and
Q3: Natural disasters and power failures affect businesses
Q4: How is data different from information?<br>A) Data
Q5: The application software that would be best
Q6: A Trojan horse _.<br>A) secretly attaches itself
Q7: A small piece of software that uses
Q8: _ can be an outcome of poorly
Q9: One of the primary considerations in deciding
Q10: Which of the following is not one
Q11: A network of smaller computers that run