An unsolicited e-mail message sent to many recipient at once is a (A) Worm (B) Virus (C) Threat (D) Spam

1 Answer

Answer :

Answer: D

Related questions

Description : Unwanted and unsolicited commercial e-mails that clog up e-mailboxes of users is classified as______________________ a. Invasion of privacy b. Spam c. Virus d. Deception

Last Answer : b. Spam

Description : What is the term for unsolicited e-mail? 1) News group 2) Use net 3) Backbone 4) Flaming 5) Spam

Last Answer : Answer :5

Description : Unsolicited e-mail is called a) Junk mail b) Spam c) Extra mail d) None of the above

Last Answer : b) Spam

Description : Unsolicited e‐mail is called what? a. Junk mail b. Spam c. Extra mail d. None of the above

Last Answer : b. Spam

Description : With regard to a word processing software, the process of combining static information in a publication together with variable information in a data source to create one merged publication is calle d( A) Electronic mail (B) Data sourcing (C) Mail merge (D) Spam mail

Last Answer : (C) Mail merge 

Description : Which of the following refers to unsolicited electronic messages? 1. Opt-in email 2. Consent marketing 3. Spam 4. Opt-out email

Last Answer : Spam

Description : 8-Unsolicited email is also known as _____. Choose one of the following to complete the sentence: Exhibit: Mark one answer: Junk Bulk Trash Spam

Last Answer : Spam

Description : A method of marketing by electronic mail wherein the recipient of the message has consented to receive it is called:  Search Marketing  Internet Advertising  Permission-based E-Mail marketing  Social Web Marketing

Last Answer :  Permission-based E-Mail marketing

Description : The facility which enables to print a large number of letter/documents with more or less similar text. Under it same invitation letter has to be sent to invitees, Only the name and address are to be changed. It is called: a) E - Mail b) Spam Mail c) Mail Merge d) None of These

Last Answer : c) Mail Merge

Description : It looks like a spam message got sent out from my hotmail. How can I make sure this doesn't happen again?

Last Answer : What do you mean it looks like a spam was sent from your hotmail? What makes you believe that happened? Do you see this message in your own Sent Mail folder? Or did someone you know tell you they ... to be from you? Or did you receive the spam in your own inbox, claiming to be from you yourself?

Description : What would your reaction be if a male sent an unsolicited nude picture to your phone?

Last Answer : Just a random dude?

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : Are there any ways to minimize or prevent your emails being marked as spam by the recipient?

Last Answer : Can’t do anything about it except switch to a different email provider or tell your email recipients to make an exception for your email.

Description : A digital signature is required (i) to tie an electronic message to the sender's identity (ii)for non repudiation of communication by a sender (iii) to prove that a message was sent by the sender in a court of law (iv) in all ... a. i and ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii

Description : What's the best way to prevent unsolicited mail from being delivered?

Last Answer : How to opt out

Description : Errors in computer programmes are called: (A) Follies (B) Mistakes (C) Bugs (D) Spam

Last Answer : (C) Bugs

Description : A mail or message sent to a large number of people indiscriminately without their consent is called ..... -Technology

Last Answer : A mail or message sent to a large number of people indiscriminately without their consent is calledspam.

Description : Since repeatability is paramount to verifying the veracity of an alleged alien radio signal, why was the Arecibo message only sent once?

Last Answer : It was an SOS signal. Help did not arrive in time.

Description : If somebody is mal-treating the aged persons, what action would you like to take against the individual? Options: A) Threat him face the consequences B) You will request him to stop the ... C) You will maltreat that individual to take revenge D) You will not involve yourself unnecessarily

Last Answer : B) You will request him to stop the mal-treatment 

Description : If the persons living in flats are not contributing for its maintenance charges, what will you decide and take action to solve the discord Options: A) You will convene an urgent meeting of the ... and debar them from co-operation D) You will withdraw your own active support to the committee

Last Answer : A) You will convene an urgent meeting of the members and request them collectively to extend their support

Description : In which of the following cases, the principle of natural justice (Hear the other party) must be followed ? (a) Dismissal of an employee (b) Supersession of a municipality (c) Threat to national security (d) Disciplinary action against a ... (d) (C) (a), (b) and (d) (D) (a), (b), (c) and (d)

Last Answer : Answer: C 

Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None

Last Answer : d. None

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : Are you concerned about the threat of the Conflicker Worm?

Last Answer : I heard of it, but it isn’t a threat to a well protected computer system. Hubby is a security specialist for his company and has worked many years in the field.

Description : PGP for OS X requires that SSL/TLS is disabled, does that mean that if it doesn't find a PGPKey for the recipient, my emails will be sent entirely unencrypted?

Last Answer : Don't you need the key to decrypt the message with PGP? SSL is a transmission privacy system, and PGP is a message privacy system If you encrypt with the public key, then only the private key ... would be able to decrypt the message. I don't think the message would be unencrypted, just unreadable

Description : What are the two parts of an E - mail address? a) User Name and Street Address b) Legal Name and Phone Number c) User Name and Domain Name d) Initials and Password e) User Name and Recipient Name

Last Answer : c) User Name and Domain Name

Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing

Last Answer : d. spoofing

Description : Does giving someone excercise equipment as a gift send the message that i think the recipient is overweight?

Last Answer : Depends…do you think she’s overweight?

Description : The process of communication contains four major parts. Which part is the vehicle or method  used to convey the message? 1. Communicator  2. Message 3. Medium  4. Recipient

Last Answer : 3. Medium

Description : What is redundancy in messages? (a) Information that recipient has already receive (b) Extra information to persuade the receiver to accept and act upon the message (c) Parts of the message that have no meaning and could be eliminated (d) Message that have no purpose and need not be retained

Last Answer : (b) Extra information to persuade the receiver to accept and act upon the message 

Description : Why some mails are sent to Spam?

Last Answer : Perhaps it triggers something in the Spam algorithm. Perhaps it is something in the way it is addresses.

Description : Can spam text messages sent to my cell be blocked?

Last Answer : Yes, just call your service provider. :)

Description : What was the first spam email ever sent?

Last Answer : Gary Thuerk, a marketer, is generally credited with sending the first spam email on May 3, 1978. It wasn't well received, but he maintains that he did nothing wrong. Nowadays, spam makes up 53 ... mail every day. We can thank Thuerk for starting the trend--and Furr for bringing us the terminology.

Description : Which one is a true statement regarding DNA polymerase used in PCR? (a) It is used to ligate introduced DNA in recipient cells. (b) It serves as a selectable marker. (c) It is isolated from a virus. (d) It remains active at high temperature.

Last Answer : (d) It remains active at high temperature.

Description : Transformation refers to a. Using A Virus To Transfer DNA Fragments. b. DNA Fragments Transferred Between Live Donor And Recipient Cells. c. The Formation of an F- Recombinant Cell. d. The Transfer of Naked Fragments of DNA

Last Answer : b. DNA Fragments Transferred Between Live Donor And Recipient Cells.

Description : Which one is a true statement regarding DNA polymerase used in PCR ? (1) It remains active at hight temperature (2) It is used to ligate introduced DNA in recipient cells (3) It serves as a selectable marker (4) It is isolated from a virus

Last Answer : (2) It is used to ligate introduced DNA in recipient cells

Description : .............. is a protocol used by e-mail clients to download emails to your computer. (A) TCP (B) FTP (C) SMTP (D) POP

Last Answer : Answer: D

Description : POP3 and IMAP are e-mail accounts in which (A) One automatically gets one’s mail everyday (B) One has to be connected to the server to read or write one’s mail (C) One only has to be connected to the server to send and receive email (D) One does not need any telephone lines

Last Answer : (C) One only has to be connected to the server to send and receive email

Description : Computers on an internet are identified by (A) e-mail address (B) street address (C) IP address (D) None of the above

Last Answer : (C) IP address

Description : An E-mail address is composed of: (A) two parts (B) three parts (C) four parts (D) five parts 

Last Answer : (A) two parts

Description : A teacher in a classroom has immediate control over (A) the self, selected methods of communication and the message. (B) the audience, the noise and the reception. (C) the feedback, the technology and the audience experience. (D) the communication channel, other communicators, and external factors.

Last Answer : (A) the self, selected methods of communication and the message.

Description : Internal and external factors that affect message reception by the students in the classroom are referred to as (A) feedback (B) fragmentation (C) channelization (D) noise

Last Answer : Answer: D

Description : In the classroom, the teacher sends the message either as words or images. The students are really (A) Encoders (B) Decoders (C) Agitators (D) Propagators

Last Answer : (B) Decoders

Description : In the process of Communication, which one of the following is in the chronological order? (A) Communicator, Medium, Receiver, Effect, Message (B) Medium, Communicator, Message, Receiver, Effect (C) Communicator, Message, Medium, Receiver, Effect (D) Message, Communicator, Medium, Receiver, Effect

Last Answer : (C) Communicator, Message, Medium, Receiver, Effect

Description : A message beneath a message is labelled as (A) embedded text (B) internal text (C) inter-text (D) sub-text

Last Answer : Answer: D Subtext undertone is any content of a creative work which is not announced explicitly by the characters or author, but is implicit or becomes something understood by the observer of ... emotions. Subtext is the unspoken thoughts and motives of characters?what they really think and believe.

Description : Identify the correct sequence of the following: (A) Source, channel, message, receiver (B) Source, receiver, channel, message (C) Source, message, receiver, channel (D) Source, message, channel, receiver

Last Answer : Answer:D An information source, which produces a message. A transmitter, which encodes the message into signals A channel, to which signals are adapted for transmission A receiver, which 'decodes' (reconstructs) the message from the signal. A destination, where the message arrives. 

Description : Which of the following statements is not connected with communication? (A) Medium is the message. (B) The world is an electronic cocoon. (C) Information is power. (D) Telepathy is technological.

Last Answer : (D) Telepathy is technological.