हिंदी

Fill following boxes with appropriate cyber crime name Gaining access without the user’s permission. - Information Technology

Advertisements
Advertisements

प्रश्न

Fill following boxes with appropriate cyber crime name

Gaining access without the user’s permission.

एक पंक्ति में उत्तर

उत्तर

Unauthorized Access

shaalaa.com
Cyber Crime Examples
  क्या इस प्रश्न या उत्तर में कोई त्रुटि है?
अध्याय 4: Cyber Law - Exercise [पृष्ठ ६९]

APPEARS IN

बालभारती Information Technology (IT) [English] 11 Standard Maharashtra State Board
अध्याय 4 Cyber Law
Exercise | Q 3.2 | पृष्ठ ६९
Share
Notifications

Englishहिंदीमराठी


      Forgot password?
Use app×
Our website is made possible by ad-free subscriptions or displaying online advertisements to our visitors.
If you don't like ads you can support us by buying an ad-free subscription or please consider supporting us by disabling your ad blocker. Thank you.