Unwanted or junk e-mail is called ________.

A. spam
B. spyware
C. adware
D. malware


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following for headers is not valid?

a. for ( int i = 0; i < 10; i++ ) b. int i = 0; for ( ; i < 10; i++ ) c. for ( int i = 0; int j = 5; ; i++ ) d. All of the above.

Computer Science & Information Technology

What does the following statement do?

vector v(10); a. It creates a vector object and initializes all its elements to the value 10. b. It creates a vector object with a starting size of 10. c. It creates a vector object and initializes the first element with the value 10. d. It creates a vector object that can only store values of 10 or less.

Computer Science & Information Technology

Screen-door effect refers to the perception that the ____ in an image are surrounded by a thin black border, giving the impression that you are looking through a fine mesh screen.

A. dots B. pixels C. lumens D. squares

Computer Science & Information Technology

Match each mathematical symbols to the operation that is performed:

I. + II. * III. / IV. ^ V. - A. Exponentiation B. Multiplication C. Subtraction D. Addition E. Division

Computer Science & Information Technology