The Electronic Communications Privacy Act (ECPA) states thatindividuals may not gain access without permission to a(n):A. fund transfer system.B. cyberspace privacy system.C. electronic communication system.D. antiviral organization.Question 2Instructions hidden in software with the potential to causesignificant damage to both hardware and software is a:A. virus.B. piracy.C. corruption.D. faade.Question 3A person who gains unauthorized access to computers either formischief or with criminal intent is called a(n):A. imposter.B. fraud.C. genius.D. hacker.