Top Posters
Since Sunday
w
3
w
3
e
3
3
r
3
b
2
M
2
V
2
f
2
c
2
c
2
K
2
New Topic  
barry barry
wrote...
Posts: 11630
10 years ago
Developers of computer systems often include a user name and password that is hidden in the system, just in case they need to get into the system and correct problems in the future. This is referred to as a
A) Trojan horse.
B) key logger.
C) spoof.
D) back door.
Read 269 times
1 Reply
Replies
Answer accepted by topic starter
newstartnewstart
wrote...
Top Poster
Posts: 6345
10 years ago
Sign in or Sign up in seconds to unlock everything for free
1

Related Topics

New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  553 People Browsing
Related Images
  
 217
  
 343
  
 192