Another name for unsolicited junk email is ____.
A. IRC chat
B. spam
C. social tagging
D. MMS
Answer: B
Computer Science & Information Technology
You might also like to view...
The ________ symbol indicates a paragraph style
A) ! B) & C) ΒΆ D) $
Computer Science & Information Technology
In order for a defense to be effective, all of the requisite ____ have to be in place and properly coordinated.
A. assets B. intrusions C. countermeasures D. backup controls
Computer Science & Information Technology