1. Throughput frauds typically involve changing live programs in order to enter --------- code for improper purposes...

Posted Date: