46.2k views
1 vote
A computer abuse technique called a ____ involves inserting unauthorized code in a program, which, when activated, may cause a disaster, such as shutting the system down or destroying files. a. logic bomb b. salami slicing c. Trojan horse d. back door

1 Answer

5 votes

A computer abuse technique called a logic bomb involves inserting unauthorized code in a program, which, when activated, may cause a disaster, such as shutting the system down or destroying files.

Step-by-step explanation:

Logic bombs are the set of commands that are embedded in a program and has some undesirable and harmful effects when some of the mentioned conditions are fulfilled. When the condition is satisfied logically, this program will begins get executed thereby affecting the computer system in an undesirable way.

These are considered to be a Malware that begins the tasks that it incorporated in it when the logical conditions are satisfied. It is kind of break that occurs in a system in which it is triggered to be executed and attacks it automatically when certain conditions are met.

User France
by
5.8k points