1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alekssandra [29.7K]
3 years ago
12

A set of instructions to increase a programmer’s pay rate by 10 percent is hidden inside an authorized program. It changes and u

pdates the payroll file. What is this computer fraud technique called? a) Trap door b) Virus Worm c) Trojan horse
Computers and Technology
1 answer:
guajiro [1.7K]3 years ago
4 0

Answer:

c) Trojan horse

Explanation:

A Trojan horse is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. A Trojan acts like a bona fide application or file to trick you. Once installed, a Trojan can perform the action it was designed for.

If a set of instructions to increase a programmer’s pay rate by 10 percent is hidden inside an authorized program and it changes and updates the payroll file, then this instructions called a Trojan horse.

A  trap door, also known as a back door, provides a secret or undocumented method of gaining access to an application, operating system or online service.

A virus worm is a malicious, self-replicating program that can spread throughout a network without human assistance

You might be interested in
Who plays rocket league?
Rashid [163]

Answer:

I dont

Explanation:

8 0
3 years ago
Read 2 more answers
Please
levacccp [35]

Answer:

inspect

Explanation:

7 0
3 years ago
Which of the following is considered a benefit of using simulation programs? a. They allow users to experience potentially dange
erica [24]

Answer:

All of the above

Explanation:

7 0
3 years ago
Can someone urgently help me with my java code (I WILL GIVE BRAINLIEST)?! Ive been working on it for hours and its not working!
o-na [289]

Answer:

code 345code 4537

Explanation:

4 0
3 years ago
You are a help desk technician providing support for a wireless network. A user calls and complains he cannot access the Interne
konstantin123 [22]

Answer:

From the user explanations, it can be inferred that the issue may be as a result of incorrect security parameters such as Wireless Protected Access (WPA) which ensure security for wireless connections.

Explanation:

If there is an incorrect access pass to the wireless network by the WPA, any wireless user will not be able to complete a Layer 2 connection to the wireless network after connecting and getting good signal indication and would thus be unable to obtain IP address automatically to be able to log on to browse the internet from the DHCP Server.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Accessing programs and documents by way of icon
    12·1 answer
  • Which of the following indicates what a reply to all function does in most email programs
    8·1 answer
  • The actual database of Active Directory shared resources is stored on one or more computers designated as:
    6·1 answer
  • A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
    7·1 answer
  • Read this excerpt from The Outsiders. Or I could have gotten one of the gang to come along, one of the four boys Darry and Soda
    10·2 answers
  • I need help building a computer what are some good parts?
    9·1 answer
  • Ventaja que implica usar funciones en las hojas de calculo
    12·1 answer
  • Write down the different types of testing with their definition.
    11·1 answer
  • Deirdre has a hearing disability. One of her friends advised her to use real-time text or RTT on her phone. In which of these
    13·1 answer
  • Create a defined name for range b6:e6 using walkup as the range name
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!