Which of the following activity will be handled under cyber law:
(i) Stealing mouse from an office.
(ii) Deleting some files, images, video‟s etc. from a friends computer with his consent.
(iii) Sending a friendship request to an unknown person.
(iv) Harassment through emails and web chatting messages.