When spam is sent via IM it is called ____.

A. spoof
B. phish
C. spim
D. junk

Answer: C

Computer Science & Information Technology

You might also like to view...

The ______________________ method retrieves string values.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following are desired features on a network switch? (Select all that apply.)

A. encryption B. Power over Ethernet (PoE) C. VLAN support D. WAN support E. Both B and C

Computer Science & Information Technology