A computer abuse technique where unauthorized instructions are inserted into a program to systemati- cally steal very small amounts, usually by rounding to the nearest cent in financial transactions
A) worm
B) salami slicing
C) logic bomb
D) Trojan horse
Correct Answer:
Verified
Q61: _ sets the tone of the organization,
Q63: The section of Sarbanes Oxley that sets
Q64: A computer abuse technique called a _
Q64: Which of the following is not a
Q65: This framework was issued in 1996 (and
Q66: A business event which is not properly
Q69: As a result of an inadequate design,
Q71: The information system control goal which relates
Q72: A computer abuse technique called a _
Q72: A measure of success in meeting a
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents