A software program that allows access to a system without going through the normal logon procedures is called a

A. logic bomb
B. Trojan horse
C. worm
D. back door


Answer: D

Computer Science & Information Technology

You might also like to view...

If in evaluating A and B, A being false causes B not to be evaluated, is an example of ______ evaluation.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Class declarations specify a programmer-defined type/object. 2. Class members may include data (attributes) and methods (functions). 3. Class attributes define the operations that may be performed on class objects. 4. Constructors are special methods of a class that are executed when objects of the class type are created. 5. Constructors must have the same name as the class

Computer Science & Information Technology

A peer-to-peer (P2P) network is an example of ________ administration

A) corporate B) wide area C) central D) local

Computer Science & Information Technology

You do not have to worry about checking the spelling and grammar in your Word documents.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology