________ is/are sent to people who explicitly choose to receive offers, information and promotions.

(a) Spam.
(b) Opt-in-e-mail.
(c) Internet mailing lists
(d) Traditional direct marketing.


(b) Opt-in-e-mail.

Computer Science & Information Technology

You might also like to view...

Which of the following is not an example of a common interface?

a. The user communicates with the application program. b. The user communicates directly with the hardware. c. The application program communicates with the operating system. d. The operating system communicates with the hardware.

Computer Science & Information Technology

Which of the following is not true about connecting to networks?

A) A network is a group of two or more computers that are linked together to exchange data and share resources, such as printers and software. B) At work, you might access a network to share a printer but also to share software or computer storage devices. C) When you access the Internet, you are connecting to the second largest computer network in the world. D) At home, you might have a network if two or more computers in your house share a wireless printer.

Computer Science & Information Technology

For 802.11, the LLC sublayer follows the IEEE 802.2 standard and the flow control/error management (CSMA/CA protocol) is part of this sub-layer.

a. true b. false

Computer Science & Information Technology

Physical security threats are organized into three categories: environmental threats, human-caused threats, and _________ threats.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology