1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alekssandra [29.7K]
3 years ago
12

A set of instructions to increase a programmer’s pay rate by 10 percent is hidden inside an authorized program. It changes and u

pdates the payroll file. What is this computer fraud technique called? a) Trap door b) Virus Worm c) Trojan horse
Computers and Technology
1 answer:
guajiro [1.7K]3 years ago
4 0

Answer:

c) Trojan horse

Explanation:

A Trojan horse is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. A Trojan acts like a bona fide application or file to trick you. Once installed, a Trojan can perform the action it was designed for.

If a set of instructions to increase a programmer’s pay rate by 10 percent is hidden inside an authorized program and it changes and updates the payroll file, then this instructions called a Trojan horse.

A  trap door, also known as a back door, provides a secret or undocumented method of gaining access to an application, operating system or online service.

A virus worm is a malicious, self-replicating program that can spread throughout a network without human assistance

You might be interested in
What are the elements of a good study environment? Check all that apply.
finlep [7]

The elements of a good study environment are that it must be well lit the resources are near it is quite and it is clutter free

Explanation:

A good study environment must be an environment that will promote the good study conditions and it must be quite and calm if a person studies in that environment all the resources like the food water and the other refreshments must be available in that environment

The environment must be clean and it must be clutter free without any disturbances and hence these are the factors that will promote the good study environment

3 0
3 years ago
Read 2 more answers
What are voter purges
diamong [38]

Answer:

Voter registration lists, also called voter rolls, are the gateway to voting because a citizen typically cannot cast a vote that will count unless his or her name appears on the voter registration rolls. State and local officials regularly remove—or purge—citizens from voter rolls. In fact, 39 states and the District of Columbiareported purging more than 13 million voters from registration rolls between 2004 and 2006.

Explanation:

7 0
4 years ago
White meat and dark meat fish have slightly different nutritional characteristics. What are the nutrition characteristics of dar
Marina CMI [18]

The nutrition characteristics of eating darker meat of fish like Salmon are that it is higher in healthy Omega-3 fats. It is true, however, that as much as it has the highest Omega-3 fats, it is also likely to be highest in any potential toxins.






7 0
3 years ago
Read 2 more answers
Which of the following is the term for software that automatically displays or downloads unwanted offers?
slega [8]
Adware. Adware displays ads and popups. The other options are completely different from each other
5 0
3 years ago
Which of the following is true of the Internet as a medium for branding? a) The Internet is more effective as a media for brandi
alexira [117]

Answer:

The answer to this question is option "d".

Explanation:

Internet branding describes as a brand management system that allows us to use the Internet as a tool for promoting the products. In other words, we can say that advertising the product on the Internet is known as Digital marketing. and other options are not correct that can be defined as:

  • In option a, It does not provide one-directional communication flow.
  • The b, c, and e options are not correct, because the internet is an effective medium for branding and it also provides services for branding.  

3 0
3 years ago
Other questions:
  • When a cache block has been modified since being read from main memory?
    10·2 answers
  • • Write a program to find the maximum, minimum, and average score of players. The input to the program is a file containing play
    9·1 answer
  • Software that interprets commands from the keyboard and mouse is also known as the
    8·1 answer
  • __________ has led to the belief that the Internet is "free".
    8·1 answer
  • The 3 parts of the CPU are
    15·2 answers
  • The Open Systems Interconnection (OSI) is a conceptual model whose purpose is to make networks more manageable. Its objectives i
    15·1 answer
  • You've been given a network of 130.0.0.0 /16. you need to divide it into four VLSM subnets as follows:
    8·1 answer
  • ¿porque y como surge la informatica y las computadoras
    13·1 answer
  • Universal containers set the organization-wide defaults for cases to private. When a case is escalated, case ownership changes t
    13·1 answer
  • Hello everyone. New ppl on Ro.blox? I want to play sometime.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!