Which of the following computer crimes involves the secret placement or alteration of computer instructions so that one computer tells another how to perform illegal functions?
A. masquerading
B. Trojan horses
C. computer viruses
D. superzapping
B
Criminal Justice
You might also like to view...
Evaluation research:
a. has developed from the physical sciences b. has developed from the world of technology c. emphasizes a pure science approach d. has been bypassed by modern computer technology
Criminal Justice
The increase in anonymous e-mail accounts and remailers has intensified incidences of online harassment, stock manipulation, and child pornography
Indicate whether the statement is true or false
Criminal Justice
Automated fingerprint identification systems began to be developed in the 1980s.
Answer the following statement true (T) or false (F)
Criminal Justice
The right to a speedy trial applies once a person is _________of a crime
Fill in the blank with correct word.
Criminal Justice