1.

The computer can potentially be used to monitor most of our actions, thus robbing us of _____

A. tapping
B. privacy
C. back log
D. security
Answer» C. back log


Discussion

No Comment Found