MCQOPTIONS
Saved Bookmarks
| 1. |
Download copy, extract data from an open system done fraudulently is treated as _________ |
| A. | cyber-warfare |
| B. | cyber-security act |
| C. | data-backup |
| D. | cyber-crime |
| Answer» E. | |