Online predatorsoftenuse chat rooms to lure their victims.
Indicate whether the statement is true or false
Question 2
The salami slice technique, pyramid schemes, and bunko schemes are examples of which type of computer crime?
a. Computer as a target
b. Computer as an instrument of a crime
c. Computer as incidental to crime
d. Crimes associated with the prevalence of computers