____ can be used to look for e-mail addresses by scanning Web pages.
A. Spam
B. Server-side
C. An e-mail harvester
D. Client-side
Answer: C
You might also like to view...
Which of the following is NOT a problem that may result from allowing uncontrolled access to the database?
A. dirty reads B. lost updates C. concurrency control D. incorrect summary
When you turn on a computer, Windows starts and displays a ____ consisting of the time and date.
A. Start screen B. lock screen C. sign-in screen D. user name screen
Mail merge is used most frequently to create:
A) form letters. B) envelopes. C) a directory. D) e-mail messages.
Case-Based Critical Thinking QuestionEddie is working on a large presentation which requires many repetitive steps. Help him figure out how to automate the repetitive steps so he can become more efficient. To combine his set of actions into one automated task, Eddie can create a(n) ____.
A. hyperlink B. macro C. action button D. new presentation