A programmer who changes information in a data base containing financial records for his or her own personal gain is guilty of <____________>.

What will be an ideal response?


computer theft/computer fraud

Computer Science & Information Technology

You might also like to view...

List three of the five methods of administering a questionnaire.

What will be an ideal response?

Computer Science & Information Technology

Images can be used as hyperlinks

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?

A. hacker B. script kiddie C. cyberextortionist D. cyberterrorist

Computer Science & Information Technology

Dynamic text can be updated outside of Flash.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology