__________ are used to send large volumes of unwanted e-mail.

A. Rootkits B. Spammer programs

C. Downloaders D. Auto-rooters


B. Spammer programs

Computer Science & Information Technology

You might also like to view...

The term __________ means the ability to take many forms.

a. inheritance b. polymorphism c. member function d. encapsulation e. None of these

Computer Science & Information Technology

What is the problem with demanding perfection?

What will be an ideal response?

Computer Science & Information Technology

What is the hybrid purpose of a book cover design?

What will be an ideal response?

Computer Science & Information Technology

When a virtual machine is converted to a template on vSphere, what happens to the .vmx configuration file?

A. It is replaced by a .vmtx template configuration file. B. It is supplemented by a .vmtx file, as both files are required to define the VM. C. Nothing; vSphere templates are created using information in a sub directory of the VM. D. It is modified to include the settings required for creating the template.

Computer Science & Information Technology