__________ are used to send large volumes of unwanted e-mail.

A. Rootkits
B. Spammer programs
C. Downloaders
D. Auto-rooters


B. Spammer programs

Computer Science & Information Technology

You might also like to view...

If you assign int x = 0.75;, what actually will be stored in memory?

A. 0 B. 0.750000 C. 1 D. You will get a compiler error.

Computer Science & Information Technology

The keyboard shortcut to move one column to the left is ________

A) Tab B) Shift + Tab C) Ctrl + Tab D) Alt + Tab

Computer Science & Information Technology

Classes that are related by inheritance have a has-a relationship.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ____ is the time at which a route will be totally removed from the routing table if no updates are received.

A. rip interval B. administrative distance C. hop count D. flush interval

Computer Science & Information Technology