Consider the following examples of computer crime as you answer the question:
i. Social Security numbers are stolen from a company’s database.
ii. A fraudster uses a computer to identify people over the age of 80 with annual incomes of $250,000 or more.
iii. An employee receives threats from a co-worker via e-mail.
iv. An unhappy customer launches a denial-of-service attack.
Carter’s taxonomy of computer crime comprises four categories. Which of the following pairs includes two items from the same category?
I and IIII and IIIII and IVI and IV