Methods used to commit check tampering

Describe the five principal methods used to commit check tampering.

Sample Solution