the use of technology to observe a user's actions often without the user's knowledge is known as:
A) Unauthorized access
B) Industrial espionage
C) Computer surveillance
D) Denial-of-service attack

Q&A Education