Solved

A Computer Abuse Technique Where Unauthorized Instructions Are Inserted into a Program

Question 24

Multiple Choice

A computer abuse technique where unauthorized instructions are inserted into a program to systemati- cally steal very small amounts, usually by rounding to the nearest cent in financial transactions


A) worm
B) salami slicing
C) logic bomb
D) Trojan horse

Correct Answer:

verifed

Verified

Unlock this answer now
Get Access to more Verified Answers free of charge

Related Questions