As computers are used to perform variety of legitimate functions, some individuals and organisations explore the use of computer to perpetrate different criminal activities like……………system intrusion, virus attacks, etc.

As computers are used to perform variety of legitimate functions, some individuals and organisations explore the use of computer to perpetrate different criminal activities like……………system intrusion, virus attacks, etc.

dangerous

malicious

vicious

criminal

JOIN OUR NOUN TELEGRAM GROUP HERE FOR MORE – ONLINE MTH TUTORIAL ALSO AVAILABLE

Leave a Reply

MEET OVER 2000 NOUN STUDENTS HERE. 

Join us for latest NOUN UPDATES and Free TMA answers posted by students on our Telegram. 

OUR ONLINE TUTORIAL CLASS IS NOW ON!!! JOIN US NOW. 
JOIN NOW!
close-link