问答题
A.The use of e-mail of the criminal. B.The intended target of the criminal. C.The data record that is kept. D.The illegal use of computer in distributing pornography.