Q. Download copy, extract data from an open system done fraudulently is treated as _________
A. cyber-warfare
B. cyber-security act
C. data-backup
D. cyber-crime
Answer: cyber-crime
A. cyber-warfare
B. cyber-security act
C. data-backup
D. cyber-crime
Answer: cyber-crime