A(n) ____ is a computer abuse technique where unauthorized instructions are inserted into a program to systematically steal very small amounts, usually by rounding to the nearest cent in financial transactions.
A) worm
B) salami slicing
C) logic bomb
D) Trojan horse
Correct Answer:
Verified
Q71: A deliberate act or untruth intended to
Q72: A computer abuse technique called a _
Q73: A control goal that is a measure
Q74: Establishing a viable internal control system is
Q75: A business event which is not properly
Q77: The section of Sarbanes Oxley that provides
Q78: Regarding internal control systems:
A) ultimate ownership of
Q79: As described in COSO, elements of a
Q80: Which of the following statements regarding a
Q81: _ relate to a specific AIS process,
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents