A. Unauthorized access to computer material
B. Unauthorized modification of computer material
C. Dissemination of viruses or other malware
D. All of the mentioned
D. All of the mentioned
A. Unauthorized access to computer material
B. Unauthorized modification of computer material
C. Dissemination of viruses or other malware
D. All of the mentioned
D. All of the mentioned