Which of the following was the first law to address computer crime in which the computer is the subject of the crime?
A) Electronic Communications Privacy Act B) Computer Fraud and Abuse Act
C) USA PATRIOT Act D) Pen/Trap Statute
B
Computer Science & Information Technology
You might also like to view...
When setting the table relationships, a key icon designates that field is a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
People use LinkedIn to expand their list of business contacts, to keep in touch with ________, and to keep abreast of developments in their profession
A) family members B) famous people C) colleagues D) childhood friends
Computer Science & Information Technology