As computers are used to perform variety of legitimate functions, some individuals and organisations explore the use of computer to perpetrate different criminal activities like……………system intrusion, virus attacks, etc.
dangerous
malicious
vicious
criminal
JOIN OUR NOUN TELEGRAM GROUP HERE FOR MORE – ONLINE MTH TUTORIAL ALSO AVAILABLE