问答题
A.The use of e-mail of the criminal. B.The intended target of the criminal. C.The data record that is kept. D.The illegal use of computer in distributing pornography:
A.their sound pattern B.their grammatical structures C.their vocabularies D.their speakers