Unauthorized copying of software to be used for personal gain instead of
for
personal backup is called ______:
a) program thievery
b) data snatching
c) software piracy
d) program looting
e) data looting
for
personal backup is called ______:
a) program thievery
b) data snatching
c) software piracy
d) program looting
e) data looting