________ includes any criminal activity which involves the unauthorized access, dissemination, manipulation, destruction, or corruption of electronically stored data
a. Cybercrime
b. Computer related crime
c. Computer crime
d. Digital crime
Answer: d
Computer Science & Information Technology
You might also like to view...
____ size is measured in points (pt), with 10 pt being a typical size for text in the body of a document.
A. Text B. Face C. Type D. Font
Computer Science & Information Technology
Public-key encryption is based on a ____.
A. message authentication code (MAC) B. certificate C. hash value D. key
Computer Science & Information Technology