1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skelet666 [1.2K]
3 years ago
11

Altering grade records within a computer system is called

Computers and Technology
2 answers:
marin [14]3 years ago
5 0

Altering grade records within a computer system is called  forgery. Correct answer: A

This type of crime includes false making or false altering of documents. The idea is to defraud anyone other than himself or herself.Forging money or currency is more often called counterfeiting.

Cloud [144]3 years ago
4 0
Altering grade records within a computer system is called forgery. The correct option among all the options given in the question is option "a". Any kind of altering using the computer without the consent of the proper authorities amounts to forgery. Forgery is a crime and a person can be jailed for such a serious offense.
You might be interested in
1.The hardware that allows data to be transmitted from a computer along a telephone line to another computer at the other end is
valkas [14]

So this is called a modem we use it to send  and receive info over telephone lines

Hope this helps

-scav

4 0
3 years ago
When you connect to an Access database, which entities are shown in the Navigator window?
Leni [432]

1DFASDFAASDASDFASDFADSFASFD

4 0
3 years ago
Read 2 more answers
Suppose a company A decides to set up a cloud to deliver Software as a Service to its clients through a remote location. Answer
finlep [7]

Answer:

perdonnosee

Explanation:

8 0
3 years ago
What is the HTML tag used to define a block of content?<br> O <br> O class<br> O #id<br> O
allsm [11]
Are there any other options
7 0
3 years ago
Read 2 more answers
Which technology will a business use to identify unauthorized access to intranet sites or files by its employees?
monitta

Answer:

Computer Forensics

Explanation:

Your Welcome....

8 0
3 years ago
Other questions:
  • In your presentation you added a text box to?
    5·1 answer
  • Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
    9·1 answer
  • A site structure that contains multiple links to individual pages, allowing visitors to go through multiple paths to the site is
    9·1 answer
  • Declare an array named tax rates of five elements of type double and initialize the elements (starting with the first) to the va
    12·1 answer
  • The material of this section assumes that search keys are unique. However, only small modifications are needed to allow the tech
    7·1 answer
  • Write a qbasic program to display integer numbers 1 to 100 using the for next loop<br>​
    9·1 answer
  • A debate about city schools are more better than village schools​
    8·1 answer
  • Why are men more exposed to mass media?
    14·2 answers
  • Pls need this asap
    14·2 answers
  • 2. How can Tailwind Traders ensure applications use geo-redundancy to create highly available storage applications?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!