English

Fill following boxes with appropriate cyber crime name Gaining access without the user’s permission. - Information Technology

Advertisements
Advertisements

Question

Fill following boxes with appropriate cyber crime name

Gaining access without the user’s permission.

One Line Answer
Advertisements

Solution

Unauthorized Access

shaalaa.com
  Is there an error in this question or solution?
Chapter 4: Cyber Law - Exercise [Page 69]

APPEARS IN

Share
Notifications

Englishहिंदीमराठी


      Forgot password?
Use app×