Answer:
a, c, and d.
Explanation:
Let's examine these options:
a -> Spamming can be used to obtain information about the individuals. Those emails can contain links that try to reveal your sensitive information. They can also contain viruses directly like in the some attached folder. Another usage of spamming is just to advertise some products.
c -> Spam emails are not something you requested for. They are just sent to email addresses in huge amounts.
d -> As mentioned earlier, they can be used to obtain personal information like password, credit card information.
Because it, not only does it give you a chance to learn more about the workplace, it also makes you look more interested in the position.
<span />
Option D is correct. If we want multiple users to access data, we will organise that data in Database we can then be accessed whenever needed.
Answer:
uses binary code to store data!
Explanation:
Answer:
(B) plug and play
Explanation:
If a device does not require a driver, it is <u>plug and play</u>. Plug and Play (PnP) is a combination of hardware and software support that enables a computer system to recognize and adapt to hardware configuration changes with little or no intervention by a user, including the loading of appropriate drivers.