1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olasank [31]
3 years ago
6

A set of instructions to increase a programmer’s pay rate by 10 percent is hidden inside an authorized program. It changes and u

pdates the payroll file. What is this computer fraud technique called? Virus Press enter after select an option to check the answer Worm Press enter after select an option to check the answer Trap door Press enter after select an option to check the answer Trojan horse
Computers and Technology
1 answer:
ivann1987 [24]3 years ago
7 0

Answer:

Trojan Horse

Explanation:

This can be a set of instructions that alters a file on the computer. It will appear to do something but will actually do something different, it usually claims to remove viruses on the computer but actually ends up introducing viruses on the computer. It contains code that executes to alter the normal flow of a program or a file.

You might be interested in
The primary purpose of an ids is to detect intrusions, log suspicious events, and send alerts.
Kamila [148]

Hello, Mochacon, so to answer this question, we must understand what and ids is. A intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces electronic reports to a management station. IDS come in a variety of "flavors" and approach the goal of detecting suspicious traffic in different ways. So according to this definition, this statement is true since and ids does detect intrusions, detects suspicious events indeed, and sends alerts when intrusions happen.

Hope this helped!

3 0
3 years ago
Why is it important to neglect writing your cover letter
Lana71 [14]
Many college students and recent grads destroy their resumes by accompanying them with halfhearted or downright terrible cover letters. While some employers don't bother reading cover letters, most do. And they will quickly eliminate you if you make these cover letter mistakes
5 0
3 years ago
Read 2 more answers
Which form of online communication happens in real time?
son4ous [18]

Answer:

texting? it happens in real time and is online.

5 0
2 years ago
What is the signifigance of the following sentence in relation to font? The quick brown fox jumps over the lazy dog? A. It has e
Talja [164]
D. Is your answer for the question. Tell me if this helps!
6 0
4 years ago
Fill in the blanks using A to J below.
Gre4nikov [31]

Answer:

A.software written to meet specific needs of company

B.Related specialized programs combined in a unified package

4 0
3 years ago
Other questions:
  • Each peripheral device has its own software, called a(n) ____, which contains the detailed instructions required to start that d
    6·1 answer
  • Think about your favorite technology item - phone, game, smartTV, etc. - Write about how your favorite technology item has impac
    7·1 answer
  • Why are fixed resistors’ values indicated by color bands rather than printing the numeric value on their exterior?
    13·1 answer
  • You are tasked with implementing a recursive function void distanceFrom(int key) on the IntList class (provided). The function w
    14·1 answer
  • Which practice is the best option for desktop security? A. Make a unique user ID and password for each account. B. Change the pa
    9·2 answers
  • Which of these is a major mobile game developer?
    9·1 answer
  • To record your own audio, you must have _____.
    14·2 answers
  • Which best describes obliteration in a forged document?
    11·1 answer
  • Which of the following statements is true of satellite internet access?
    13·1 answer
  • How can ICT be a tool in connecting all stakeholders in your community?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!