________ is the modification of data by altering accounts or database records so that it is difficult or impossible to tell that the accounts have stolen funds or equipment.
a. Forgery
b. Data diddling
c. Salami shaving
d. Shilling
Ans: b. Data diddling
You might also like to view...
A descending sort organizes a list of numeric data in lowest to highest order
Indicate whether the statement is true or false
Suppose a new set of protocols were to replace TCP and IP as standard network protocols. How difficult would it be to incorporate support for these new protocols intoWindows XP?
What will be an ideal response?
Which of the following is true about creating a blank PivotTable?
A) A PivotTable may not be created on a connection to an external dataset. B) A PivotTable may only be created from a table. C) A PivotTable may not be created from a range. D) A PivotTable may be created on the same worksheet as the source data.
The ____ e-commerce model involves the transfer of goods, services, or information between businesses.
A. Business-to-business (B2B) B. Consumer-to-consumer (C2C) C. Business-to-consumer (B2C) D. Consumer-to-business (C2B)