According to the author, what we should do to fight against would best be ______
A.
to punish all the computer crimes whenever they are detected
B.
to carry out systematic inspections or other security procedures
C.
to control information that is stored inside computer memories
D.
to have enough Statistics on computer crimes that go undetected