________ is/are sent to people who explicitly choose to receive offers, information and promotions.
(a) Spam.
(b) Opt-in-e-mail.
(c) Internet mailing lists
(d) Traditional direct marketing.
(b) Opt-in-e-mail.
You might also like to view...
Which of the following is not an example of a common interface?
a. The user communicates with the application program. b. The user communicates directly with the hardware. c. The application program communicates with the operating system. d. The operating system communicates with the hardware.
Which of the following is not true about connecting to networks?
A) A network is a group of two or more computers that are linked together to exchange data and share resources, such as printers and software. B) At work, you might access a network to share a printer but also to share software or computer storage devices. C) When you access the Internet, you are connecting to the second largest computer network in the world. D) At home, you might have a network if two or more computers in your house share a wireless printer.
For 802.11, the LLC sublayer follows the IEEE 802.2 standard and the flow control/error management (CSMA/CA protocol) is part of this sub-layer.
a. true b. false
Physical security threats are organized into three categories: environmental threats, human-caused threats, and _________ threats.
Fill in the blank(s) with the appropriate word(s).