Which of the following was the first law to address computer crime in which the computer is the subject of the crime?

A) Electronic Communications Privacy Act B) Computer Fraud and Abuse Act
C) USA PATRIOT Act D) Pen/Trap Statute

B

Computer Science & Information Technology

You might also like to view...

When setting the table relationships, a key icon designates that field is a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

People use LinkedIn to expand their list of business contacts, to keep in touch with ________, and to keep abreast of developments in their profession

A) family members B) famous people C) colleagues D) childhood friends

Computer Science & Information Technology