When spam is sent via IM it is called ____.
A. spoof
B. phish
C. spim
D. junk
Answer: C
Computer Science & Information Technology
You might also like to view...
The ______________________ method retrieves string values.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which of the following are desired features on a network switch? (Select all that apply.)
A. encryption B. Power over Ethernet (PoE) C. VLAN support D. WAN support E. Both B and C
Computer Science & Information Technology