
提问人:网友l******8
发布时间:2023年4月1日 00:02
[]
From Paragraph 4, we know that the IT companies usually access the users private information byA.hacking users' computers and stealing useful informationB.requiring real personal information on social networksC.making unnoticeable modifications to technical settingsD.inserting advertisement into websites users browse
A.hackingB.requiringC.makingD.inserting

