1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alekssandra [29.7K]
3 years ago
12

A set of instructions to increase a programmer’s pay rate by 10 percent is hidden inside an authorized program. It changes and u

pdates the payroll file. What is this computer fraud technique called? a) Trap door b) Virus Worm c) Trojan horse
Computers and Technology
1 answer:
guajiro [1.7K]3 years ago
4 0

Answer:

c) Trojan horse

Explanation:

A Trojan horse is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. A Trojan acts like a bona fide application or file to trick you. Once installed, a Trojan can perform the action it was designed for.

If a set of instructions to increase a programmer’s pay rate by 10 percent is hidden inside an authorized program and it changes and updates the payroll file, then this instructions called a Trojan horse.

A  trap door, also known as a back door, provides a secret or undocumented method of gaining access to an application, operating system or online service.

A virus worm is a malicious, self-replicating program that can spread throughout a network without human assistance

You might be interested in
A business wants to centralize its administrative tasks. At the same time, it wants the existing systems to manage and sustain t
qwelly [4]

Answer:

real-time analytics

Explanation:

Real time analytics is a type of data analysis that is done immediately the data for analysis is available. This can allow users to draw conclusion or acquire new insights swiftly and immediately the data enters their system. Businesses use real time analytics when there is a need to make and execute new decisions without hesitation.

A business that wants to centralize its administrative tasks and simultaneously wants the existing system to manage and sustain the growing amount of work in a capable manner would use real-time analytics.

7 0
4 years ago
What symbol do we use to denote a character?
pychu [463]

Answer:

'Single Character'

Explanation:

A Character, commonly abbreviated as "char", is a computer symbol, letter, or number. A keyboard is an input device that inputs a character when a key is pressed.

5 0
3 years ago
In his work for a new company, Byron found a flower material that he could use to manufacture dresses. In his career, Byron is m
bekas [8.4K]

I guess the correct answer is plant system pathway

Thе plant systеms pathway includеs οccupatiοns rеlatеd tο grοwing fοοd, fееd, and fibеr crοps, and thе study οf plantsand thеir grοwth tο hеlp prοducеrs mееt cοnsumеr dеmand whilе cοnsеrving natural rеsοurcеs and maintaining thе еnvirοnmеnt.

In his work for a new company, Byron found a flower material that he could use to manufacture dresses. In his career, Byron is most likely focused on the plant system pathway.


5 0
3 years ago
Read 2 more answers
6. How can you encrypt an entire drive, including files and folders belonging to other users? a. EFS b. User Account Control c.
matrenka [14]

Answer:

A.

Explanation:

Encrypting File System (EFS) is a file system which enables you to encrypt files, thus making them unviewable by any account but your own.

6 0
3 years ago
A database is used instead of a spreadsheet when
guajiro [1.7K]
            Both spreadsheets and databases, play a part in the daily
    operations of many businesses. While you do not necessarily need to choose between spreadsheets and databases, they are often suited to different types of tasks. Understanding the key differences between spreadsheets and databases is vital if you want to make the best use of either or both of them.
     Spreadsheets and databases share some characteristics, but they involve different technologies.
               Databases generally involve a higher level of technical processing.
-Rosie
4 0
3 years ago
Other questions:
  • Software license infringement is also often called software __________.
    11·2 answers
  • A self-confident person knows that:
    13·1 answer
  • What is the top folder of the file tree called
    5·2 answers
  • What is an administrator?
    15·1 answer
  • What was the first computer programming language?
    7·2 answers
  • What is GND and what color wire do we connect to GND? (this is like for circuits and stuff btw)
    7·1 answer
  • How Can I add a image in an HTML program?​ please tell
    6·1 answer
  • Enhancement of job satisfaction and productivity are key characteristics of which theoretical perspective of work design? ​
    6·1 answer
  • If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folde
    11·1 answer
  • Help please i will mark brainlist!
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!