1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brilliant_brown [7]
3 years ago
11

A computer abuse technique called a ____ involves inserting unauthorized code in a program, which, when activated, may cause a d

isaster, such as shutting the system down or destroying files. a. logic bomb b. salami slicing c. Trojan horse d. back door
Computers and Technology
1 answer:
tatyana61 [14]3 years ago
8 0

A computer abuse technique called a logic bomb involves inserting unauthorized code in a program, which, when activated, may cause a disaster, such as shutting the system down or destroying files.

<h3><u>Explanation:</u></h3>

Logic bombs are the set of commands that are embedded in a program and has some undesirable and harmful effects when some of the mentioned conditions are fulfilled. When the condition is satisfied logically, this program will begins get executed thereby affecting the computer system in an undesirable way.

These are considered to be a Malware that begins the tasks that it incorporated in it when the logical conditions are satisfied. It is kind of break that occurs in a system in which it is triggered to be executed and attacks it automatically when certain conditions are met.  

You might be interested in
Which is said to be ‘computer on a chip’ (a) Micro processors (b) Microcontrollers (c) Both (c) None of the above
SIZIF [17.4K]
(C) None of the above
5 0
3 years ago
What is a benefit of an account with interest?
GrogVix [38]

You improve your credit history

6 0
3 years ago
Please select the word from the list that best fits the definition Asking for review material for a test
Bess [88]

Answer:

B

Explanation:

7 0
3 years ago
Read 2 more answers
Study and compare the tables and draw conclusions.
SSSSS [86.1K]
Need the tables for an answer
5 0
3 years ago
This type of connection is best to use when downloading large files on a network.
Elina [12.6K]
Ethernet is best to use when you have to download large files on a network.
8 0
3 years ago
Other questions:
  • You can encrypt individual files, but microsoft recommends encrypting at what level?
    9·1 answer
  • Why does this say I'm in middle school?
    11·1 answer
  • Cuales Son las características de la máquina analítica de Carlos Babbage ?
    11·1 answer
  • Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact tha
    5·1 answer
  • Que funcion tiene la sombrilla forrada de aluminio​
    6·1 answer
  • Select the correct answer.
    11·1 answer
  • Which one is correct
    8·1 answer
  • Which element is represented by the electron configuration in example B? Example B: 1s22s22p63s23p64s1 Aluminum Cesium Potassium
    12·2 answers
  • How many 60 KB jpeg files can be stored on a 2 MB folder in your hard drive?​
    7·1 answer
  • Please help me on this it’s due now
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!