Q.

Download copy, extract data from an open system done fraudulently is treated as _________

A. cyber-warfare
B. cyber-security act
C. data-backup
D. cyber-crime
Answer» D. cyber-crime
902
0
Do you find this helpful?
5

Discussion

No comments yet