A _________ is a computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms
What will be an ideal response?
Trojan horse
Business
You might also like to view...
Assets may be used to satisfy business obligations and to carry on business operations
a. True b. False Indicate whether the statement is true or false
Business
In the 1990s and early 2000s, researchers began to investigate leadership traits associated with ______.
A. goal achievement B. social intelligence C. values-based actions D. self-confidence
Business
Which of the following is an example of a source document in a computerized accounting information system?
A) statement of cash flows B) balance sheet C) bank checks D) general ledger
Business
One of the assumptions of CVP analysis assumes production and sales to be approximately equal
Indicate whether the statement is true or false
Business