单项选择题
A. The use of e-mail of the criminal. B. The intended target of the criminal. C. The data record that is kept. D. The illegal use of computer in distributing pornography.