Which of the following is best characterized by unauthorized modification of data before or during systems data entry

  • Data modeling
  • Salami attack
  • Data corruption
  • Data diddling
  • Skimming
 Which of the following is best characterized by unauthorized modification of data before or du
Home Ask Questions Study Current Affairs Previous Papers Kerala PSCIBPSUPSCRBITNPSCMPSCSSCCBSEUnited StatesModel Tests News More Answers Coaching Centres Careers Downloads Colleges