1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alekssandra [29.7K]
3 years ago
12

A set of instructions to increase a programmer’s pay rate by 10 percent is hidden inside an authorized program. It changes and u

pdates the payroll file. What is this computer fraud technique called? a) Trap door b) Virus Worm c) Trojan horse
Computers and Technology
1 answer:
guajiro [1.7K]3 years ago
4 0

Answer:

c) Trojan horse

Explanation:

A Trojan horse is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. A Trojan acts like a bona fide application or file to trick you. Once installed, a Trojan can perform the action it was designed for.

If a set of instructions to increase a programmer’s pay rate by 10 percent is hidden inside an authorized program and it changes and updates the payroll file, then this instructions called a Trojan horse.

A  trap door, also known as a back door, provides a secret or undocumented method of gaining access to an application, operating system or online service.

A virus worm is a malicious, self-replicating program that can spread throughout a network without human assistance

You might be interested in
Gary has to complete a form before enrolling into an online course. A few of the fields require Gary to respond with either a "Y
zalisa [80]
I think its C. Boolean
Hope this helped!
3 0
3 years ago
Read 2 more answers
Importancia del sistema operativo
love history [14]

Answer:

Un sistema operativo es el software más importante de tu computador, ya que se encarga de gestionar el hardware, el acceso a la memoria, acceso a la CPU y controlar gran parte de las tareas que lleva a cabo tu computador.

7 0
2 years ago
Which one of the following downloads and uploads files to and from a server? A. Client B. Internet protocol C. Server D. Worksta
earnstyle [38]
The answer is A. Client request and receive files to and from a server.
5 0
3 years ago
How long is the bachelor's program at Eth Zurich? 3 or 4 years?
natulia [17]
The bachelor's program at Eth Zurich is 3 years.
I hope this helps!
:-)
4 0
3 years ago
Amtex Electronics, a consumer products brand, frequently advertises its products inside supermarkets and retail stores to promot
Aloiza [94]

Answer:

Amtex Electronics promotes the process of memory retrieval and stimulate purchase.

Explanation:

Recall or retrieval of memory refers to information from the past, which has encoded and stored in the brain. It is known as remembering.

For example, the memory of your son drinking juice is an example of retrieval. Memory had been stored in long- term memory.

Many types of memory retrieval are recall and recognition. This information must be retrieved from memories.

3 0
3 years ago
Other questions:
  • You have already learned about the various types of lenses. Now, conduct online research and mention as many possible types of l
    9·1 answer
  • Which cisco ios command is used to display the current ospf neighbors and their rids?
    11·1 answer
  • Which one of the following characteristics or skills of a ScrumMaster are closelyaligned with coaching?Select one:
    5·1 answer
  • Que es un programa de ordenador?
    10·1 answer
  • You have four DCs in your domain. Active Directory appears to be corrupted on one of the DCs, and you suspect a failing hard dri
    5·1 answer
  • What integer is represented by the following 8-bit twos complement representation: 1011 0000 ? (Enter your number in decimal, an
    6·1 answer
  • Que es un vlog? Cual es la diferencia entre vloc y papgina web? ​
    7·1 answer
  • Where does the turtle belong in the cladogram shown below?<br> I’LL GIVE YOU BRAINLYEST
    6·2 answers
  • is a measurement that quantifies how much information can be transmitted over the network. A. Memory B. DMZ C. Bandwidth D. Clou
    10·1 answer
  • Most spyware programs are benign in that they do not perform malicious acts or steal data. group of answer choices true false
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!