Which of the following computer crimes involves the secret placement or alteration of computer instructions so that one computer tells another how to perform illegal functions?

A. masquerading
B. Trojan horses
C. computer viruses
D. superzapping


B

Criminal Justice

You might also like to view...

Evaluation research:

a. has developed from the physical sciences b. has developed from the world of technology c. emphasizes a pure science approach d. has been bypassed by modern computer technology

Criminal Justice

The increase in anonymous e-mail accounts and remailers has intensified incidences of online harassment, stock manipulation, and child pornography

Indicate whether the statement is true or false

Criminal Justice

Automated fingerprint identification systems began to be developed in the 1980s.

Answer the following statement true (T) or false (F)

Criminal Justice

The right to a speedy trial applies once a person is _________of a crime

Fill in the blank with correct word.

Criminal Justice