Which one of the following is an example of ‘using computer as a weapon’?
ACyber Terrorism
BIPR violations
CCredit and Frauds
DAll of these
ACyber Terrorism
BIPR violations
CCredit and Frauds
DAll of these
Related Questions:
താഴെ തന്നിരിക്കുന്നവയിൽ ശരിയായ പ്രസ്താവന ഏത് ?
Consider the following statements in the context of session hijacking.Which of the statement(s) given is/are correct ?