Computer Science - Management Information Systems - Discussion

9. 

The computer can potentially be used to monitor most of our actions, thus robbing us of _____

[A]. tapping
[B]. privacy
[C]. back log
[D]. security
[E]. None of the above

Answer: Option B

Explanation:

No answer description available for this question.

Post your comments here:

Name *:

Email   : (optional)

» Your comments will be displayed only after manual approval.