What is GIS? How GIS has been used in the public sector (offer at least three examples)? What are the different aspects of information security? Give an example of computer crime or cybervandalism that attempts to attack each of the three aspects.
custom-essay
0