1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dezoksy [38]
4 years ago
9

The following is true about SPAM ________.

Computers and Technology
1 answer:
aev [14]4 years ago
8 0

Answer:

a, c, and d.

Explanation:

Let's examine these options:

a -> Spamming can be used to obtain information about the individuals. Those emails can contain links that try to reveal your sensitive information. They can also contain viruses directly like in the some attached folder. Another usage of spamming is just to advertise some products.

c -> Spam emails are not something you requested for. They are just sent to email addresses in huge amounts.

d -> As mentioned earlier, they can be used to obtain personal information like password, credit card information.

You might be interested in
Whichof the following is not a standard method called as part of the JSPlife cycle?jspInit()jspService()_jspService()jspDestroy(
olga nikolaevna [1]

Answer:

jspService()

Explanation:

These are the steps in JSP life cycle-

1. We have to convert JSP page to Servlet.

2.Then we compile the JSP page which convert it into test.java

3. In test.java ,we load the classes(test.class) in container.

4. Object(instance) is created in container .

5. Then, we initialize the init() method at the time of servlet generation.  

6. After the initialization,for the requests we use _jspService() method to serve the incoming requests from JSP.

7. When the work of JSP is completed, we remove it from container by the help of jspDestroy() method.

There is no jspService() method in the JSP life cycle.

7 0
3 years ago
Which form of data does the image represent? (10 points)<br><br> A. Analog data<br> B. Digital data
dusya [7]
Where is the image?, I cant answer if there is no image
6 0
3 years ago
Read 2 more answers
One of the most toxic components of a computer is the _____. one of the most toxic components of a computer is the _____. plasti
erik [133]
<span>One of the most toxic components of a computer is the </span>lead embedded in the glass of the monitor.  Lead is one the toxic chemicals that can harm us.
7 0
3 years ago
What is shouting pertaining to the internet
Ludmilka [50]
Hi!

What is considered shouting on the internet is when WHEN YOU TYPE IN ALL CAPS LIKE THIS!!! Doing this seems to make the words appear louder and more prominent. You can also add more emphasis to ALL CAP words by adding ***ASTERISKS***.
8 0
3 years ago
When two or more tables share the same number of columns, and when their corresponding columns share the same or compatible doma
ryzh [129]

Answer:

:Union compatible

Explanation:

Two parameters are said to be similar or union compatible if both the parameter have similar attribute.

In DBMS, two table are said to be union compatible if they have same attribute and same attribute domain.

It help to draw the attention toward the structure of the table that shows that all the attribute on which table has been drawn are same in both given table.

8 0
4 years ago
Other questions:
  • Prior to the release of a movie, a film studio launches a website that allows people to play online games featuring actors in th
    15·2 answers
  • What is the value of vals[4][1]? double[][] vals = {{1.1, 1.3, 1.5}, {3.1, 3.3, 3.5}, {5.1, 5.3, 5.5}, {7.1, 7.3, 7.5}};
    6·1 answer
  • A stop sign is an example of?
    11·2 answers
  • When a startup failure occurs before the logon user interface appears, the problem could be hardware-related but it is most like
    14·1 answer
  • Write code to simulate the following differential equation for x ranging from 0 to 5. Assume y = 0 when x = 0. Plot y vs. x usin
    11·1 answer
  • in a typical e-mail address, the "host" is A. an account designated by a user name B. CPU processor 2500 C. the receiver of an e
    12·2 answers
  • Which is an example of continuous delivery?
    11·1 answer
  • Explain the function of different flags in the 8086<br>​
    12·1 answer
  • Name at least 3 different portable computer devices that can be purchased
    15·2 answers
  • The term _____ refers to an organization of components that define and regulate the collection, storage, management and use of d
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!