1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alekssandra [29.7K]
3 years ago
12

A set of instructions to increase a programmer’s pay rate by 10 percent is hidden inside an authorized program. It changes and u

pdates the payroll file. What is this computer fraud technique called? a) Trap door b) Virus Worm c) Trojan horse
Computers and Technology
1 answer:
guajiro [1.7K]3 years ago
4 0

Answer:

c) Trojan horse

Explanation:

A Trojan horse is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. A Trojan acts like a bona fide application or file to trick you. Once installed, a Trojan can perform the action it was designed for.

If a set of instructions to increase a programmer’s pay rate by 10 percent is hidden inside an authorized program and it changes and updates the payroll file, then this instructions called a Trojan horse.

A  trap door, also known as a back door, provides a secret or undocumented method of gaining access to an application, operating system or online service.

A virus worm is a malicious, self-replicating program that can spread throughout a network without human assistance

You might be interested in
Something I should look for when trying to decide if a source is credible is the publication's ....
storchak [24]
Answer: Date

Explanation: We receive new information everyday, and things are always changing. If something is old, it may need to be updated with the correct information
7 0
3 years ago
A mechanic uses a screw driver to install a ¼-20 UNC bolt into a mechanical brace. What is the mechanical advantage of the syste
velikii [3]

Answer:

15.7 ; 78.5

Explanation:

Mechanical advantage of a screw = Circumference / pitch

Circumference = pi × d

Where :

pi = 3.142, D = diameter

Therefore ;

Circumference = 3.142 × (1/4) = 0.785 in

Pitch = 1/TPI

TPI (thread per inch) = 20

Pitch = 1/ 20 = 0.05

Mechanical advantage = 0.785 / 0.05 = 15.7

Resistance force if effort force is 5lb

Mechanical advantage = Fr / Fe

Fe = effort force, Fr = resistance force

15.7 = Fr / 5

Fr = 15.7 × 5 = 78.5 lbs

7 0
3 years ago
In a __________ attack, data that can modify how applications or services operate is downloaded (stored) onto the targeted serve
katovenus [111]

Answer:

The answer is "Cross-Site Coding Persistent"

Explanation:

This coding is also known as an XSS, it is a threat, that converts the files into harmless pages by injecting malware.  

  • This type of scripting is used by the hacker, that passes malware to a different final consumer with a web app, which is typically used by the client end-script.
  • It is very dangerous because the information can be transmitted to a specific repository, which may change by apps and services work.
6 0
3 years ago
How to copy patch into the program directory?
Lady_Fox [76]
#1) How to copy patch into the program directory?
Answer: You need to locate the program directory for your application, and copy the patch file to the folder. You can use the copy and paste functions by using the right click on your mouse or using the keybord keys ctrl + c for copying and ctrl + v for pasting.
5 0
4 years ago
Moderate changes to existing processes falls under the _________ analysis. Business Process Automation (BPA) Business Process Im
serg [7]

Answer: Business Process Improvement (BPI)

Explanation: Business Process Improvement is a management practice, procedure or methodology embarked upon by embarked upon by business strategists or leaders with the aim of analyzing or detecting areas of weaknesses or dip, formulate solution to improve productivity, accuracy and efficiency and then applying the proffered solution to the improve the business process. Hence, enhancing productivity, growth and the overall scope of a business. Improving the Business process involves understanding or detecting the areas of weakness or shortfalls, then working on possible solutions to correct the shortfalls and finally implementing the solution to the business process to view or observe improvement.

4 0
4 years ago
Other questions:
  • 1. A video card on a modem motherboard would run best in which type of slot?
    10·1 answer
  • What's does the Mutual Reward Theory state?
    10·1 answer
  • 1. Of which of the following is a box an example?
    10·2 answers
  • Elements of a job application and résumé, like dates and addresses, do not have to be accurate.
    14·1 answer
  • Which of the following Google tools support collaboration? Docs Sheets Slides All of the Above
    13·1 answer
  • I need help ASAP Asap asap!!!
    11·1 answer
  • Which statement best describes an advantage of using the Subtotal dialog box?
    14·1 answer
  • Which examples demonstrate common qualifications for Marketing Information Management and Research careers? Check all that apply
    9·2 answers
  • Python;
    6·1 answer
  • How to change the microsoft word pages to black background
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!