Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of:
ASoftware Piracy
BCyber Crime
CConventional Crime
DNone of these
ASoftware Piracy
BCyber Crime
CConventional Crime
DNone of these
Related Questions:
Which of the following statements are true?
1.A rootkit is a malicious software that allows an unauthorised user to have privileged access to a computer and to restricted areas of it software.
2.A rootkit may contain a number of malicious tools such as keyloggers, banking credential stealers, password stealers,antivirus disablers etc