Sending mass, unsolicited email messages is called ________

A) payloading B) hijacking C) spamming D) hoaxing


C

Computer Science & Information Technology

You might also like to view...

Which of the following is not a common name for one of the three phases that a program often can be split into using pseudocode?

a. Termination phase b. Initialization phase c. Processing phase d. Action phase

Computer Science & Information Technology

A(n) ____ image is an image that changes its appearance when the mouse pointer is placed over it in a browser.

A. dynamic B. rollover C. extensible D. pop-up

Computer Science & Information Technology

Adjust the column ________ to accommodate the widest entry in a column

Fill in the blank(s) with correct word

Computer Science & Information Technology

What are version sets and stacks?

What will be an ideal response?

Computer Science & Information Technology