________ include small pieces of code hidden in an e-mail message

A) Web bugs B) Computer monitoring applications
C) Spyware programs D) Adware programs

A

Computer Science & Information Technology

You might also like to view...

Instead of using numbers to designate footnotes, you can use standard footnote symbols

Indicate whether the statement is true or false

Computer Science & Information Technology

What is one of the disadvantages of a peer-to-peer network compared to a server-based network?

A. more difficult to setup and install B. more expensive C. higher administration costs D. limited security

Computer Science & Information Technology