Which computer fraud technique involves a set of instructions hidden inside a calendar utility that copies itself
Question:
Which computer fraud technique involves a set of instructions hidden inside a calendar utility that copies itself each time the utility is enabled until memory is filled and the system crashes?
a. Logic bomb
b. Trap door
c. Virus
d. Trojan horse
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 85% (7 reviews)
a Incorrect A logic bomb sabotages a system using a progr...View the full answer
Answered By
HARSH RANJAN
Taken classes at college to graduates, Also worked as an expert to a freelancer online question-solving portal for more than 8 months with an average rating greater than 4.2 out of 5.
5.00+
1+ Reviews
10+ Question Solved
Related Book For
Question Posted:
Students also viewed these Business questions
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
A traditional test for extra- sensory perception (ESP) involves a set of playing cards, each of which shows a different symbol (circle, square, cross, star, or wavy lines). If C represents a correct...
-
Match the computer fraud and abuse technique in the left column with the scenario in the right column. Terms on the left may be used once, more than once, or not atall. 1. Dictionary attack a Spcal...
-
Q3. Modulus of rupture of concrete is a measure of a) flexural tensile strength b) direct tensile strength c) compressive strength d) split tensile strength Q4. For a longitudinal reinforcing bar in...
-
The following data were taken from recent annual reports of Southwest Airlines, which operates a low-fare airline service to over 50 cities in the United States. (a) Determine the number of times...
-
Consider a 35-ft 3 /s flow of atmospheric air at 14.7 psia, 77 F, and 80% relative humidity. Assume this flows into a basement room, where it cools to 60 F at 14.7 psia. How much liquid will condense...
-
8-2. In terms of market segments and products, what are the three market segmentation strategies?
-
After graduating from college in December 2014, Elizabeth Arce started her career at the W&T Corporation, a small- to medium-sized warehouse distributor in Nashville, Tennessee. The company was...
-
Steuben Company produces dog houses. During the current year, Steuben Company incurred the following costs: Rent on manufacturing facility office manager's salary Wages of factory machine operators...
-
The following are independent situations. Based on the accrual basis of accounting, explain when the companies should recognize revenue. a. You order a leather jacket from Aritzia online. You submit...
-
Interest calculations are truncated at two decimal places, and the excess decimals are put into an account the perpetrator controls. What is this fraud called? a. Typosquatting b. URL hijacking c....
-
A set of instructions to increase a programmers pay rate by 10% is hidden inside an authorized program. It changes and updates the payroll file. What is this computer fraud technique called? a. Virus...
-
Pierre Duhaime retired as CEO of SNCLavalin on March 26, 2012, a post that he had held since 2009 following over 20 years of employment at the company. He did so, because of his role in approving...
-
James A. and Ella R. Polk, ages 70 and 65, respectively, are retired physicians who live at 3319 Taylorcrest Street, Houston, Texas 77079. Their three adult children (Benjamin Polk, Michael Polk, and...
-
I need help solving the following question: - Thank you in advance. On January 1, Year 6, HD Lid., a building supply company, JC Lid., a construction company, and Mr. Saeid, a private investor,...
-
Let X 1 , , X n X 1 , , X n be a random sample from a normal distribution with mean and variance 1. Find the uniformly minimum variance unbiased estimator of 2 2 .2 answers
-
The ledger of Duggan Rental Agency on March 31 of the current year includes the following selected accounts before adjusting entries have been prepared. Debit Credit Prepaid Insurance $3,600 Supplies...
-
1.Using the Excel file Sales transaction find the following15 Marks a.Identify the levels of measurement for each variables b.Construct a cross tabulation to find the number of transactions by...
-
A forensic chemist is given a white powder for analysis. She dissolves 0.50 g of the substance in 8.0 g of benzene. The solution freezes at 3.9C. Can the chemist conclude that the compound is cocaine...
-
Three successive resonance frequencies in an organ pipe are 1310, 1834, and 2358 Hz. (a) Is the pipe closed at one end or open at both ends? (b) What is the fundamental frequency? (c) What is the...
-
Describe how Web 2.0 tools might be used by any of the managers depicted in Figure 10.1, a horizontal perspective of the OE/S process, or in Figure 10.2, a vertical perspective of the OE/S process.
-
An enterprise system supports a business process by: a. Facilitating the functioning of the business process. b. Providing records that business events have occurred. c. Storing data for decision...
-
An enterprise system supports a business process by: a. Facilitating the functioning of the business process. b. Providing records that business events have occurred. c. Storing data for decision...
-
) A form used to organize and check data before preparing financial reports is known as a(n):A) statement of financial position.B) income statement.C) ledger. D) worksheet.2) Bringing account...
-
16) The entry to record the payment of office salaries would be: A) Debit Cash; Credit Salaries PayableB) Debit Cash; Credit Salaries ExpenseC) Debit Salaries Expense; Credit Accounts PayableD) Debit...
-
9) The general journal:A) is the book of original entry.B) is the book of final entry.C) contains account balances.D) is completed after the closing entries.10) The process of initially recording...
Study smarter with the SolutionInn App