Multiple Choice
A malicious program that enters program code without consent and performs destructive actions in the victim's computer files or programs is a(n) :
A) encryption device.
B) phishing expedition.
C) computer virus.
D) Trojan horse.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: Interest paid on a company's checking account
Q2: Which of the following is an accurate
Q3: In a bank reconciliation, items recorded by
Q4: The primary way that fraud and errors
Q6: The bank reconciliation can be used to
Q7: The primary way that fraud is prevented
Q8: Cash requires specific internal controls because:<br>A) cash
Q9: Which of the following would NOT be
Q10: When a company receives cash by mail:<br>A)
Q11: The basic attributes of internal control are