A programmer who changes information in a data base containing financial records for his or her own personal gain is guilty of <____________>.
What will be an ideal response?
computer theft/computer fraud
Computer Science & Information Technology
You might also like to view...
List three of the five methods of administering a questionnaire.
What will be an ideal response?
Computer Science & Information Technology
Images can be used as hyperlinks
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
A. hacker B. script kiddie C. cyberextortionist D. cyberterrorist
Computer Science & Information Technology
Dynamic text can be updated outside of Flash.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology