Accounting Information Systems
Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
Question
Book Icon
Chapter 15, Problem 2MCQ
To determine

Identify the program that attaches to another legitimate program and replicates itself into areas of idle memory.

Blurred answer
Students have asked these similar questions
A program that attaches to another legitimate program but does NOT replicate itself is called a a. virus.b. worm.c. Trojan horse.d. logic bomb.
Which statement is NOT true? Batch processinga. is subject to deadlocks when processing commonaccounts.b. permits data to be edited in a separate computerrun.c. can use databases and flat files.d. can be initiated from a terminal.
A DDos attacka. is more intensive than a Dos attack because it emanates from single source.b. may take the form of either a SYN flood or smurf attack.c. is so named because it affects many victims simultaneously, which are distributed across the Internet.d. turns the target victim’s computers into zombies that are unable to access the Internet.e. none of the above is correct.

Chapter 15 Solutions

Accounting Information Systems

Knowledge Booster
Background pattern image
Similar questions
Recommended textbooks for you
Text book image
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Text book image
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning