A Trojan Horse, which is left within a computing system with the intent of it executing when some condition occurs.
The logic bomb could be triggered by a change in a file, by a particular input sequence to the program, or at a particular time or date.
Logic bombs get their name from malicious actions that they can take when triggered.