________ includes any criminal activity which involves the unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data

a. Cybercrime
b. Computer related crime
c. Computer crime
d. Digital crime

Answer: d

Computer Science & Information Technology

You might also like to view...

____ size is measured in points (pt), with 10 pt being a typical size for text in the body of a document.

A. Text B. Face C. Type D. Font

Computer Science & Information Technology

Public-key encryption is based on a ____.

A. message authentication code (MAC) B. certificate C. hash value D. key

Computer Science & Information Technology