A______is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date
a. denial-of-service attack b. logic bomb
c. botnet d. rootkit
b
You might also like to view...
Under the perpetual inventory system, which of the following accounts would not be used?
a. Cost of Goods Sold b. Merchandise Inventory c. Sales d. Purchases
____ occurs when a manager deliberately underestimates revenues or overestimates costs
A) Goal congruence B) Pseudoparticipation C) Budgetary slack D) Setting standards too high E) None of these
Employees who perform manual tasks continuously are strong candidates for carpal tunnel syndrome.
Answer the following statement true (T) or false (F)
At the time they are granted, which of the following have no tax implications for an executive?
A. Stock appreciation rights B. Incentive stock options C. Performance share/unit plans D. Phantom stock plans