Top Posters
Since Sunday
a
5
k
5
c
5
B
5
l
5
C
4
s
4
a
4
t
4
i
4
r
4
r
4
New Topic  
barry barry
wrote...
Posts: 11630
9 years ago
Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
Read 290 times
1 Reply
Replies
Answer accepted by topic starter
newstartnewstart
wrote...
Top Poster
Posts: 6345
9 years ago
Sign in or Sign up in seconds to unlock everything for free
1

Related Topics

New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  1352 People Browsing
 132 Signed Up Today
Related Images
  
 467
  
 963
  
 26
Your Opinion
Who will win the 2024 president election?
Votes: 3
Closes: November 4

Previous poll results: Where do you get your textbooks?