Challenger App

No.1 PSC Learning App

1M+ Downloads
The cyber terrorism comes under:

ASection 67 B

BSection 66 F

CSection 67 A

DSection 72 F

Answer:

B. Section 66 F


Related Questions:

Which of the following program is not a utility?
The inventor of World Wide Web :
Website found by Jeffry Bezos is .....
net domain is used for
While browsing internet, what do we call the area of storage that compensates for the different speeds of data flow or timings of events by temporarily holding a block of data that is waiting to be processed?