Multiple Choice
A computer abuse technique where unauthorized instructions are inserted into a program to systemati- cally steal very small amounts, usually by rounding to the nearest cent in financial transactions
A) worm
B) salami slicing
C) logic bomb
D) Trojan horse
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q19: According to the 2008 Report to the
Q20: _ is a series of actions or
Q25: Below is an alphabetical list of sources
Q26: A logic bomb is a computer abuse
Q27: _ is the entity's identification and analysis
Q28: Events that could have a negative impact
Q29: A control plan requires that a manager
Q38: The section of Sarbanes Oxley that authorizes
Q51: The business process objectives that an internal
Q136: The _ framework suggests that organizations and