1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
12345 [234]
3 years ago
8

An unwanted 'explosion' of inbox messages is called​

Computers and Technology
2 answers:
hammer [34]3 years ago
7 0

Answer:

spaming

Explanation: dictionary ex,

Anvisha [2.4K]3 years ago
5 0

Answer:

Spamming refers to the practice of flooding the inboxes with an unsolicited emails addressed to hundreds or thousands of recipients in an attempt to force the message on people who would not otherwise choose to receive it. It has also been called "junk e-mail". hope that helps

Explanation:

You might be interested in
What's is flow chart?
TEA [102]

Answer: A flowchart is a graphical representation of decisions and their results mapped out in individual shapes.

Explanation:

These shapes were first developed by Herman Goldstine and John von Neumann in the 1940s.

Flowcharts can provide a step-by-step diagram for mapping out complex situations, such as programming code or troubleshooting problems with a computer.

4 0
3 years ago
Where is the video card located in a computer?
Rama09 [41]
Video card??????????
3 0
3 years ago
Read 2 more answers
What were second generation languages that required detailed knowledge of the computer's hardware and a lot of spare time to wri
Natalija [7]

Answer:

Assembly language is also known as second generation language. We can also say it low level language. To implement assembly language on hardware it require a lot of knowledge of computer hardware.

Mostly assembly language is used in Kernel and hardware drives like RAM or ROM these hardware parts belong to second generation. So, assembly language require a lot of knowledge of hardware as well spare time also to write it to get desired output from the hardware.

Assembly language is also used in video editing and video games and require a lot of time.

I hope it will help you!

4 0
3 years ago
Can you think of any other disruptive or nontraditional ways of earning that you could use the Internet?
denis23 [38]

Explanation:

The internet is a tool that has revolutionized the way communication is carried out. As it is a dynamic tool with easy access for any user, it is possible to use different platforms or social media to realize disruptive or non-traditional forms of earnings.

Some of them could be the dissemination of links that would generate advertising for other companies, or the free dissemination in social media of services, and several other innovations that use the internet as the main means to manufacture an extra income, such as online teaching, advertising for third parties etc.

7 0
3 years ago
In a four-stroke engine, the time period when both valves are slightly open is called valve
Thepotemich [5.8K]
Answer to my knowledge is d. overlap
3 0
3 years ago
Other questions:
  • Pointsyour company environment includes windows server versions 2003, 2008, and 2012. desktops range from windows xp and vista.
    13·1 answer
  • You view a portion of a document on the screen through a ____.
    15·1 answer
  • In a system using the fixed partitions memory allocation scheme, given the following situation (and using a decimal form): After
    9·1 answer
  • Which threading model is best for achieving true parallelism and how?
    8·1 answer
  • What is BINARY it is making get confused
    10·1 answer
  • 1.) Florida has ____________ roads that are designated as part of the National Highway System.
    12·1 answer
  • Write a C program to calculate and display the coordinates of midpoint - M of a linesegment between two given points - say A and
    7·1 answer
  • technician is dispatched to troubleshoot a user's computer. After performing diagnostics, the technician determines that drive t
    5·1 answer
  • 14. In cell B14, create a formula without using a function that adds 1 to the value in cell B12 and then multiplies the result b
    9·1 answer
  • consider the following code segment, which appears in a method in a class other than password. the code segment does not compile
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!