Another name for unsolicited junk email is ____.

A. IRC chat
B. spam
C. social tagging
D. MMS

Answer: B

Computer Science & Information Technology

You might also like to view...

The ________ symbol indicates a paragraph style

A) ! B) & C) ΒΆ D) $

Computer Science & Information Technology

In order for a defense to be effective, all of the requisite ____ have to be in place and properly coordinated.

A. assets B. intrusions C. countermeasures D. backup controls

Computer Science & Information Technology