________ include small pieces of code hidden in an e-mail message
A) Web bugs B) Computer monitoring applications
C) Spyware programs D) Adware programs
A
Computer Science & Information Technology
You might also like to view...
Instead of using numbers to designate footnotes, you can use standard footnote symbols
Indicate whether the statement is true or false
Computer Science & Information Technology
What is one of the disadvantages of a peer-to-peer network compared to a server-based network?
A. more difficult to setup and install B. more expensive C. higher administration costs D. limited security
Computer Science & Information Technology