Download copy, extract data from an open system done fraudulently is treated as _________

Q. Download copy, extract data from an open system done fraudulently is treated as _________

A.            cyber-warfare

B.            cyber-security act

C.            data-backup

D.            cyber-crime

Answer: cyber-crime

We will be happy to hear your thoughts

Leave a reply

Gkseries.com
Logo
Register New Account