1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djverab [1.8K]
3 years ago
14

____ is (are) the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.

Computers and Technology
1 answer:
Volgvan3 years ago
4 0
Pretty sure answer is <span>E-mail spam</span>
You might be interested in
Mhairi believes that if a site’s information is detailed enough, it is more likely to be true. Is she correct? Answers
inysia [295]
In my opinion, I would say No. So I think the answer is C.
6 0
3 years ago
Read 2 more answers
(Display nonduplicate words in ascending order)
olya-2409 [2.1K]

Answer:

The program to this question as follows:

Program:  

value = input("Input text value: ") #defining variable value and input value by user

word = value.split() #defining variable word that split value

sort_word = sorted(word) #defining variable using sorted function

unique_word = [] #defining list

for word in sort_word: #loop for matching same value

   if word not in unique_word: #checking value

       unique_word.append(word) #arrange value using append function

print(' '.join(unique_word)) #print value

Output:

Input text value: Good morning Good afternoon Good evening

Good afternoon evening morning  

Explanation:

In the above python code, a value variable is defined that uses input function to input value from the user end, and the word variable is declared, which uses the split method, which split all string values and defines the sort_word method that sorted value in ascending order.

  • Then an empty list "unique_word" is defined, which uses the for loop and inside the loop, a conditional statement is used.
  • In if block, it matches all value is unique if this is condition is true it will arrange all values and uses the print function to print all value.  

5 0
3 years ago
In a food chain are living creatures that eat organisms from a diferente population?
marysya [2.9K]
I’m thinking predator? Or maybe consumer?
3 0
2 years ago
Read 2 more answers
What utility is used to verify that tcp/ip installed, bound to the nic, configured correctly, and communicating with the network
klasskru [66]
<span>PING is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network. Ping is used diagnostically to ensure that a host computer the user is trying to reach is actually operating. Ping works by sending an Internet Control Message Protocol (ICMP) Echo Request to a specified interface on the network and waiting for a reply. Ping can be used for troubleshooting to test connectivity and determine response time.</span>
6 0
4 years ago
Which hexadecimal number equal 11000101
Ket [755]
(11000101)2<span> = (C5)</span>16<span> = C5h so your final answer is C5 or in decimal it is 197</span>
3 0
3 years ago
Other questions:
  • Why must programs written in a high-level language be translated into machine language?
    5·1 answer
  • Jennifer recently bought a new computer to type a new manuscript she’s been working on. She also stored a lot of movies on it to
    10·1 answer
  • A media company that has separate, autonomous companies for movies, tv, internet, and print journalism is most likely a ________
    7·1 answer
  • Complete the following conversions. You MUST show all of your work to receive full credit.
    13·1 answer
  • In computing the present value of the lease payments, the lessee should a.use both its incremental borrowing rate and the implic
    8·1 answer
  • What is the most common concern with using variable frequency drives?
    6·1 answer
  • Internet Security: How can you work securely on the internet? What actions should be avoided and what are the pitfalls?
    9·1 answer
  • What is the answer to this question I am not sure?
    7·2 answers
  • List the steps to look it install and then run a program or mobile app
    8·1 answer
  • The people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulat
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!