1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
12345 [234]
3 years ago
8

An unwanted 'explosion' of inbox messages is called​

Computers and Technology
2 answers:
hammer [34]3 years ago
7 0

Answer:

spaming

Explanation: dictionary ex,

Anvisha [2.4K]3 years ago
5 0

Answer:

Spamming refers to the practice of flooding the inboxes with an unsolicited emails addressed to hundreds or thousands of recipients in an attempt to force the message on people who would not otherwise choose to receive it. It has also been called "junk e-mail". hope that helps

Explanation:

You might be interested in
Henry wants to use handheld computers to take customers' orders in her restaurant. He is thinking of using custom written, open
DochEvi [55]

Answer: See explanation

Explanation:

Custom written software refers to the software that's developed for some particular organization or users. It's crates in order to meet the unique requirements of a business.

Since Henry is thinking of using custom written, open source software, then a custom written software will be used. Examples of custom written software will be automated invoicing, bug tracking software, E-commerce software solutions etc.

7 0
3 years ago
Wendy wants to learn how to write a computer program that can get the dimensions of a rectangle from the user and then tell the
otez555 [7]

Answer:

algorithms for finding the area

Explanation:

you need algorithms to find out any computer input information.

4 0
3 years ago
Read 2 more answers
What country is associated with the tor relay using the ip address 104. 244. 74. 97?.
Lelu [443]

Answer:

104.28.63.45 is an IP address located in Santos, Sao Paulo.

Explanation:

3 0
2 years ago
What should you call a person who has permission to bypass the security of a computer to access it
Sav [38]

Answer:

Administrator

Explanation:

Such permission to bypass the security of a computer to access it is being given to only the administrator. No other user is allowed to have such privileges. And there is only one administrator in a team, and this is the standard as only then the security of a network of computers, and a particular computer can be ensured. And the correct answer to this question is certainly the Administrator.

7 0
3 years ago
A support agent who feels that a user needs substantial assistance with the organization of files on their pc should ____.
Lapatulllka [165]
A support agent who feels that a user needs substantial assistance with the organization of files on their PC should p<span>oint the user to useful information about file organization. 
Given that the user needs substantial assistance, the support agent cannot just simply explain to them what they need to do. He does, however, need to tell them where they can learn about what they need to know.
</span>
6 0
3 years ago
Other questions:
  • What is the outlined area called?
    6·1 answer
  • 15. What type of presentation includes information created in a different Office application?
    7·1 answer
  • When using an online media source, students should ensure the information is
    13·2 answers
  • Your instructor has asked you to perform some research regarding a computer OS capability of distinguishing spoken words. What i
    14·1 answer
  • Your employer's right to electronically monitor you is an issue of ____.
    13·1 answer
  • To convince the server that a user is authentic, the authentication server creates a _________ that contains the user's ID and n
    13·1 answer
  • Take the average of some numbers. Show all the numbers that are below average. You can assume that there will not be more than 2
    10·1 answer
  • You are finally at the stage of the software life cycle where you begin programming. What is this stage called?
    12·1 answer
  • Describe the major elements and issues with system prototyping​
    7·1 answer
  • How does a Cloud-first strategy differ from other approaches to Cloud?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!