Sending mass, unsolicited email messages is called ________
A) payloading B) hijacking C) spamming D) hoaxing
C
Computer Science & Information Technology
You might also like to view...
Which of the following is not a common name for one of the three phases that a program often can be split into using pseudocode?
a. Termination phase b. Initialization phase c. Processing phase d. Action phase
Computer Science & Information Technology
A(n) ____ image is an image that changes its appearance when the mouse pointer is placed over it in a browser.
A. dynamic B. rollover C. extensible D. pop-up
Computer Science & Information Technology
Adjust the column ________ to accommodate the widest entry in a column
Fill in the blank(s) with correct word
Computer Science & Information Technology
What are version sets and stacks?
What will be an ideal response?
Computer Science & Information Technology