____ can be used to look for e-mail addresses by scanning Web pages.

A. Spam
B. Server-side
C. An e-mail harvester
D. Client-side


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a problem that may result from allowing uncontrolled access to the database?

A. dirty reads B. lost updates C. concurrency control D. incorrect summary

Computer Science & Information Technology

When you turn on a computer, Windows starts and displays a ____ consisting of the time and date.

A. Start screen B. lock screen C. sign-in screen D. user name screen

Computer Science & Information Technology

Mail merge is used most frequently to create:

A) form letters. B) envelopes. C) a directory. D) e-mail messages.

Computer Science & Information Technology

Case-Based Critical Thinking QuestionEddie is working on a large presentation which requires many repetitive steps. Help him figure out how to automate the repetitive steps so he can become more efficient. To combine his set of actions into one automated task, Eddie can create a(n) ____.

A. hyperlink B. macro C. action button D. new presentation

Computer Science & Information Technology