1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maw [93]
3 years ago
11

Cindy Vindoolo logged on to her e-mail account to find that she had received 50 e-mails from a company called LifeCo that promis

ed her extreme weight loss if she bought their diet pills. Cindy angrily deleted all 50 e-mails, realizing she was a victim of a. telemarketing. b. direct mail. c. spam. d. MLM.
Computers and Technology
1 answer:
zmey [24]3 years ago
5 0

Answer:

Option C i.e., spam is the correct answer to the following question.

Explanation:

The following mails are spam because when Cindy opens her mail account then, Cindy finds that she gets 50 emails from the unknown company which promises the weight loss if she will buy pills form that company named "LifeCo.". Cindy gets that these companies are fraud or they cheat so they deleted those messages angrily because those are spam.

You might be interested in
Five programs are currently being run in a computer. Program 1 is using 10 GiB of RAM, program 2 is using 5 GiB of RAM, program
muminat

Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be  isolated from the other processes.

<h3>How is virtual memory used instead of RAM?</h3>

A system is known to make use of a virtual memory and this is one that tend to make use of a section of the hard drive to act like the RAM.

With the use of virtual memory, a system can be able to load bigger or a lot of programs running at the same time, and this is one that tends to hep one to work as if it has more space, without having to buy more RAM.

Therefore, Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be  isolated from the other processes.

Learn more about virtual memory from

brainly.com/question/13088640

#SPJ1

6 0
1 year ago
Which step in the software development life cycle involves making improvements based on user feedback?
BigorU [14]

Answer:

Design Phase

Explanation:

In design phase developers make prototypes. The prototype is the solution without actual implementation. That prototype is shown to the user for the purpose of getting feedback. So design phase of SDLC involves making improvements based on user feedback.

3 0
3 years ago
Read 2 more answers
Can someone help me with these questions?
REY [17]

website will be the first, hyperlink will be the second, A will be number three, and webpage will be number 4

8 0
3 years ago
1. W jaki sposób można wyrównać tekst po wstawieniu tabulatora?
Advocard [28]
I would say the correct answer is #1.
5 0
3 years ago
Which is a feature of audio editing software?
riadik2000 [5.3K]
D. It is used to add sound effects.
Hope this helps!
5 0
3 years ago
Read 2 more answers
Other questions:
  • Where can you access email accounts on your windows 7 computer in order to modify current accounts or create new ones?
    5·1 answer
  • The following declaration appears in a program: short totalPay, basePay = 500, bonus = 1000; The following statement appears in
    9·1 answer
  • In this question, we give two implementations for the function: def intersection_list(lst1, lst2) This function is given two lis
    15·1 answer
  • Where does the term for a star network describe? A) a network for Department of Defense scientists to share data about the stars
    13·2 answers
  • Technology can cause a drop in input costs.<br> a. True<br> b. False
    6·2 answers
  • A user has just reported that he downloaded a file from a prospective client using IM. The user indicates that the file was call
    11·1 answer
  • Create a program that generates a report that displays a list of students, classes they are enrolled in and the professor who te
    11·1 answer
  • Please help im not good at computer class ​
    10·2 answers
  • You want a cable that could be used as a bus segment for your office network. The cable should also be able to support up to 100
    5·1 answer
  • IF ANYONE ANSWERS YOUR QUESTION WITH SOMETHING LIKE THIS:
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!