Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using a. a Trojan horse. b. the salami technique. c. superzapping. d. a trap door.