1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikki [24]
3 years ago
8

E-mails that are mailed directly to a consumer without their knowledge or permission are called

Computers and Technology
2 answers:
Alik [6]3 years ago
8 0

Answer:

I thought it was scam, but it was spam lol

Explanation:

gizmo_the_mogwai [7]3 years ago
6 0
E-mails that are mailed directly to a consumer without knowledge or permission are called spam
You might be interested in
Defensive programming is sometimes referred to as _________.
Romashka [77]
Anti-malware and Anti-Virus
6 0
3 years ago
Write a program to input elements of 4*3matrix and prints its elements properly using array ​
Harlamova29_29 [7]

Answer:

Step by step explanation:

7 0
2 years ago
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
Gnoma [55]
Forensics.

--------------------------------------
5 0
3 years ago
What are all the possible 4-digit codes you can make with the numbers 7, 0, 9, and 3?
Arte-miy333 [17]
0,7,0,0
9,9,0,0
7,7,7,7
3,9,0,7

Hope this helps
4 0
3 years ago
Read 2 more answers
How do I add my bestie on brainy? /??!!! ​
ziro4ka [17]

Answer:

You have to remember their name on here

Explanation:

If u dont you cant talk to them again

3 0
3 years ago
Other questions:
  • Your boss calls you from his home to use the vpn connection you configured for him on his laptop. he has traditionally depended
    6·1 answer
  • Do AirPods Pro have a green flashing light when charging?
    11·2 answers
  • When public relations professionals make provocative statements in newsgroups to get people to visit an organization's website o
    10·1 answer
  • The invention of the transistor was important to the development of computers because
    14·1 answer
  • A look to different section of the same page is known as_____.
    7·1 answer
  • An email message containing a warning related to a non-existent computer security threat, asking a user to delete system files f
    6·1 answer
  • Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permi
    10·1 answer
  • Dora has inserted a text box into a Word document that she is formatting. Which strategy will not format text boxes? Create a li
    6·2 answers
  • How can a cell phone tower help people​
    11·2 answers
  • Question #5
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!