Answer:
a, c, and d.
Explanation:
Let's examine these options:
a -> Spamming can be used to obtain information about the individuals. Those emails can contain links that try to reveal your sensitive information. They can also contain viruses directly like in the some attached folder. Another usage of spamming is just to advertise some products.
c -> Spam emails are not something you requested for. They are just sent to email addresses in huge amounts.
d -> As mentioned earlier, they can be used to obtain personal information like password, credit card information.
True however it’s also depends on where you live but for this purpose it’s true
Answer:
Phased installation
Explanation:
The name of this strategy is phased installation. Phased installation (or phased implementation) occurs when an existing system is replaced by a new one. However, unlike most implementations, this takes place in stages. This has several advantages. First, it allows you to test the system. If there is a problem with it, it is easier to revert back to the old strategy. Moreover, if employees need to adopt this new system, it allows them to get used to it slowly while still being able to access the previous one.
A password and pin hope this helps :D