Challenger App

No.1 PSC Learning App

1M+ Downloads
The cyber terrorism comes under:

ASection 67 B

BSection 66 F

CSection 67 A

DSection 72 F

Answer:

B. Section 66 F


Related Questions:

Which access method is used for obtaining a record from a cassette tape ?
Buying and selling of products using computer and network is called :
Which of the following technology is used for exchange of data between different systems ?
The translator program that translates each line of the source program as it runs is called :
IP stand for