Unwanted and unsolicited commercial e-mails that clog up e-mailboxes of users is classified
as______________________
a. Invasion of privacy
b. Spam
c. Virus
d. Deception

1 Answer

Answer :

b. Spam

Related questions

Description : Unwanted internet mails and ads. are also known as - a. Fraud b.Spam c. Drafts d. All of the these

Last Answer : b.Spam

Description : Unwanted internet mails and ads. are also known as - a. Fraud b.Spam c. Drafts d. All of the these

Last Answer : b.Spam

Description : Unsolicited e-mail is called a) Junk mail b) Spam c) Extra mail d) None of the above

Last Answer : b) Spam

Description : An unsolicited e-mail message sent to many recipient at once is a (A) Worm (B) Virus (C) Threat (D) Spam

Last Answer : Answer: D

Description : What is an arrangement made between marketing site that direct users from one site to the other? a) Spam b) Viral marketing c) Affiliate programs d) None of the above

Last Answer : c) Affiliate programs

Description : What is the term for unsolicited e-mail? 1) News group 2) Use net 3) Backbone 4) Flaming 5) Spam

Last Answer : Answer :5

Description : Unsolicited e‐mail is called what? a. Junk mail b. Spam c. Extra mail d. None of the above

Last Answer : b. Spam

Description : Which of the following refers to unsolicited electronic messages? 1. Opt-in email 2. Consent marketing 3. Spam 4. Opt-out email

Last Answer : Spam

Description : 8-Unsolicited email is also known as _____. Choose one of the following to complete the sentence: Exhibit: Mark one answer: Junk Bulk Trash Spam

Last Answer : Spam

Description : State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system. a) True, False b) False, True c) True, True d) False, False

Last Answer : c) True, True

Description : Cropping a photograph means: a) Cleaning a photograph b) Developing a black and white reel c) Cutting out unwanted background d) None of these

Last Answer : c) Cutting out unwanted background

Description : Why some mails are sent to Spam?

Last Answer : Perhaps it triggers something in the Spam algorithm. Perhaps it is something in the way it is addresses.

Description : I suddenly got a lot of spam mails from craigslist and now I can't sign into my account! Help?

Last Answer : I recommend contacting Craigslist and retrieving your password. Might also want to double check your username and Caps lock keys.

Description : How do you deal with unwanted spam?

Last Answer : What email do you have? And we are talking about email, right? If someone is mailing you the “meat product” on a regular basis, that’s really a totally different issue.

Description : Do you think that it is an invasion of privacy for a website to "eavesdrop" on your browsing/search history?

Last Answer : There's nothing we can do about that in this day and age. Anything I look up on the internet is fair game to anyone that wants to know my browsing history. Also, anything I say on my smart ... you were removed from a site because of your interests, you don't want to belong to that site anyway.

Description : Invasion of privacy. How should I deal with this situation?

Last Answer : I think I would just let it go, but never let him take care of your aquariums again. Does he have a spare key? If he has one or has ever had one, I would change the locks.

Description : Do you think it's an invasion of privacy to listen to this cassette tape?

Last Answer : You are 28 and your brother is now 33. Let him know what you happened upon and see what he thinks. I would venture that after 17 years, your parents would think it is funny.

Description : Google Buzz: I want to get rid of this invasion of privacy "buzzing"...what can I do?

Last Answer : Disable Google Buzz

Description : New high-tech airport imagers -- common sense to keep us safe or unacceptable invasion of privacy?

Last Answer : Now that sources are saying they could have prevented the guy from getting on board, I'm all for them even more. I see no problem with them at all. How could they invade someones privacy? ... will see your panties, these same people buy stuff on the internet and risk getting their identity stolen.

Description : Is Googling someone an invasion of privacy?

Last Answer : I wouldn’t say invasion of privacy, but any information you find on someone is out there for a reason.

Description : What are examples of invasion of privacy?

Last Answer : What are some examples of Invasion of privacy?cybercrimesending virus

Description : Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser? a) Affiliate programs b) Click-through c) Spam d) All of the above

Last Answer : b) Click-through

Description : Which term represents a count of the number of people who visit one site, click on are taken to the advertiser? a. Affiliate programs b. Click-through c. Spam d. Conversion rate

Last Answer : d. Conversion rate

Description : Which term represents a count of the number of people who visit one site, click on are taken to the advertiser? a. Affiliate programs b. Click-through c. Spam d. Conversion rate

Last Answer : d. Conversion rate

Description : Spam B. Viral marketing C. Affiliate programs D. None of the above

Last Answer : B. Viral marketing

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : Which Act in India focuses on data privacy and information technology? a. IT(ammendment)Act 2008 b. Indian Penal code c. IT Act 2000 d. None of these

Last Answer : c. IT Act 2000

Description : Right to Privacy is included in which article of Indian constitutions? a. Article 21 b. Article 12 c. Article 15 d. Article 25

Last Answer : a. Article 21

Description : Use of Full Body Scanner at Airport is an issue between a. Security and Copyright b. Copyright and Privacy c. Security and Privacy d. None of the above

Last Answer : c. Security and Privacy

Description : Which Act in India focuses on data privacy and information technology? a. IT(ammendment)Act 2008 b. Indian Penal code c. IT Act 2000 d. None of these

Last Answer : c. IT Act 2000

Description : Kind of e-marketing domain which is initiated by business to target consumers is classified as a. business to consumer domain b. business to business domain c consumer to business domain d. consumer to consumer domain

Last Answer : b. business to business domain

Description : Are there fewer mailboxes in the world?

Last Answer : Yes, I have noticed it. My guess is there was too much vandalism. People would use them as garbage cans, break in looking for money. People probably trusted them so little, they would be empty, or close to it most of the time.

Description : Why are many mailboxes shaped like arches?

Last Answer : I think it makes sense. Ease of construction. A sloping roof to let water roll down. A flat bottom to lay letters.

Description : What are those green mailbox things that aren't really mailboxes and don't even open?

Last Answer : They’re generally used by postal workers to store mail they have picked up along their route for pickup by a truck later. That way the postal worker doesn’t have to lug all that extra mail with him/her all day.

Description : What are the most durable mailboxes you can buy?

Last Answer : In my experience, the hard plastic Rubbermaid boxes are extremely durable as well as their posts. Unlike wood or metal boxes, they do not rust or rot over time and seem to hold up very well!

Description : Acceptance testing means A. Testing performed on a single stand - alone module or unit of code B. Testing after changes have been made to ensure that no unwanted changes were introduced C. ... the needs of the organization and end user. D. Users test the application in the developers environment

Last Answer : C. Testing to ensure that the system meets the needs of the organization and end user.

Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above

Last Answer : c. Affiliate programs

Description : Website built to engage customers from different places to move them closer for marketing outcome is classified as- a. corporate website b. marketing website c branding website d. viral website

Last Answer : d. viral website

Description : Website used to build customer goodwill, supplement sales channels and collect customer feedback is classified as a. corporate website b. marketing websitec branding website d. viral website

Last Answer : a. corporate website

Description : Group of online social communities such as virtual worlds, social networking sites and blogs where people exchange opinions is classified as a. inbound social networks b. outbound social networks c offline social networks d. online social networks

Last Answer : b. outbound social networks

Description : Website build to engage customers from different places to move them closer for marketing outcome is classified as a. corporate website b. marketing website c branding website d. viral website

Last Answer : d. viral website

Description : Website build to engage customers from different places to move them closer for marketing outcome is classified as ______________ a. corporate websiteb. marketing website c. branding website d. viral website

Last Answer : b. marketing website

Description : Website built to engage customers from different places to move them closer for marketing outcome is classified as- a. corporate website b. marketing website c. branding website d. viral website

Last Answer : b. marketing website

Description : Group of online social communities such as virtual worlds, social networking sites and blogs where people exchange opinions is classified as A. inbound social networks B. outbound social networks C. offline social networksD. online social networks

Last Answer : D. online social networks

Description : The Convention on the Rights of Child, 1989, classified child rights into four categories – (a) Life, Liberty, Equality and Fraternity (b) Civil, Political, Economic and Cultural Rights (c) Survival, Development, Protection and Participation Rights (d) None of these

Last Answer : (c) Survival, Development, Protection and Participation Rights

Description : Which type of advertising often carry an illustration of the product/service in the newspaper? a) Classified Advertising b) Local Advertising c) Display Advertising d) None

Last Answer : c) Display Advertising

Description : How to remove unwanted anti-virus spyware?

Last Answer : What OS are you running? Do you know the name of the program you are trying to remove? If it is a legitimate anti-malware app, you should be able to disable it through it's control panel or ... your data and reinstall your OS, then do a full scan with reliable anti-virus and anti-spyware apps.

Description : An online retail company is based in the United States but ships to customers all over the world. If this company wants to serve Spanish language ads to Spanish-speaking users, which targeting ... be refined? a. Demographic targeting b. Regional targeting c. Language targeting d. Ad scheduling

Last Answer : a. Demographic targeting

Description : A renter of postbox can receive a) All fully prepaid unregistered mails addressed to the renter of the postbox b) Article addressed to casual visitors and commercial representatives c) Articles addressed to family member and guest of the renter d) All of above

Last Answer : d) All of above