__________ are used to send large volumes of unwanted e-mail.
A. Rootkits B. Spammer programs
C. Downloaders D. Auto-rooters
B. Spammer programs
You might also like to view...
The term __________ means the ability to take many forms.
a. inheritance b. polymorphism c. member function d. encapsulation e. None of these
What is the problem with demanding perfection?
What will be an ideal response?
What is the hybrid purpose of a book cover design?
What will be an ideal response?
When a virtual machine is converted to a template on vSphere, what happens to the .vmx configuration file?
A. It is replaced by a .vmtx template configuration file. B. It is supplemented by a .vmtx file, as both files are required to define the VM. C. Nothing; vSphere templates are created using information in a sub directory of the VM. D. It is modified to include the settings required for creating the template.