A _________ is a computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms

What will be an ideal response?


Trojan horse

Business

You might also like to view...

Assets may be used to satisfy business obligations and to carry on business operations

a. True b. False Indicate whether the statement is true or false

Business

In the 1990s and early 2000s, researchers began to investigate leadership traits associated with ______.

A. goal achievement B. social intelligence C. values-based actions D. self-confidence

Business

Which of the following is an example of a source document in a computerized accounting information system?

A) statement of cash flows B) balance sheet C) bank checks D) general ledger

Business

One of the assumptions of CVP analysis assumes production and sales to be approximately equal

Indicate whether the statement is true or false

Business