Junk E_mails are also called spam. -Technology

1 Answer

Answer :

True E-mail spam, junk mail or junk newsgroup posting is a widelyrecognized form of spam.

Related questions

Description : The attribute which is used to send E_mails through a Website. (a) tomail -Technology

Last Answer : (b) mailto attribute is used to send E-mails through a Website.

Description : Junk e- mail is also called: a) Spam b) Spill c) Spoof d) None of These

Last Answer : a) Spam

Description : Junk e-mail is also called _____: a) Spam b) Spoof c) Cookie Crumbs d) Sniffer Script e) Spill

Last Answer : a) Spam

Description : 8-Unsolicited email is also known as _____. Choose one of the following to complete the sentence: Exhibit: Mark one answer: Junk Bulk Trash Spam

Last Answer : Spam

Description : Unsolicited e-mail is called a) Junk mail b) Spam c) Extra mail d) None of the above

Last Answer : b) Spam

Description : Unsolicited e‐mail is called what? a. Junk mail b. Spam c. Extra mail d. None of the above

Last Answer : b. Spam

Description : Do you draw a distinction between JUNK and SPAM in your email?

Last Answer : answer:Junk and Spam are the same to me. when I check my email I delete everything without even bothering to read it. I only read email from people I really know and that I correspond with on a regular basis. ... don't even bother opening to read. If I don't know ya, I really don't care. my motto

Description : Self-sending spam emails - mark as junk or just delete?

Last Answer : You should mark these as spam, or setup a rule so that if you ever do need to send anything to yourself you can use a keyword in the subject so it isn’t junked. Take a look at ‘rules’ in the Mail.app preferences. Hope this helps!

Description : Give one word answer 1. Another name for junk mails. -Technology

Last Answer : 1. Spam2. E-Business/E-Commerce3. Cybercrime4. Hacker5. Spyware

Description : The electronic equivalent of junk mail is known as (a) adware -Technology

Last Answer : (c) Spam is an electronic equivalent of junk mail.

Description : Which one of the following is not a malware? (a) Computer virus (b) Spam -Technology

Last Answer : (d) Application software refers to the condition in which your computer stops working.

Description : What can be done about excessive robocalls and spam calls?

Last Answer : I'm guessing she has a land line, with no easy way to block calls. So have I, and it is a persistent, annoying problem. It disturbs my peace, breaks my train of thought, intrudes on my attention, ... me for service on a device that is mostly used by entities that just want to part me from my money?

Description : Unwanted internet mails and ads. are also known as - a. Fraud b.Spam c. Drafts d. All of the these

Last Answer : b.Spam

Description : Unwanted internet mails and ads. are also known as - a. Fraud b.Spam c. Drafts d. All of the these

Last Answer : b.Spam

Description : Sun Lab’s Java Car uses ....... technology to keep your car networked with the world outside. (1) embedded (2) spam (3) smart Screen(4) access Point

Last Answer : embedded

Description : Secondary storage is also called auxiliary storage. -Technology

Last Answer : TrueBecause secondary storage is a part of external memory. It is used to store a large amount of data at less cost per byte than primary memory.

Description : A field in a table is also called as ………………… . -Technology

Last Answer : A field in a table is also called ascolumn.

Description : Which one of the magnetic storage disk is also known as diskette? Explain it with its advantages and disadvantages. -Technology

Last Answer : Floppy disk drive is also known as diskette or FDD. It is a computer disk drive that enables a user to save data on removable diskettes.This portable storage device is a rewritable media that can ... damaged and not much reliable.2. Quite slow to access and retrieve data.3. Easily affected by heat

Description : The usefulness of computers has now become a part of humanity. You cannot imagine life without them. (i) Do computers have Weaknesses also. -Technology

Last Answer : (i) Yes, computers have weaknesses. Some weaknesses of computers are lack of decision making power, zero IQ and no heuristics. (ii) Computers are used to listen to songs, send E-mail etc. in daily life

Description : Pen drive is also known as (a) Flash drive (b) Data stick (c) Thumb drive (d) All of the above -Technology

Last Answer : (d) A USB flash drive, data stick, thumb drive or pen drive is a portable drive that connects to a computer’s USB port.

Description : Anila works in a Multinational Company (MNC) and needs to work online from home also. She requires fast Internet connection -Technology

Last Answer : She should prefer broadband connection. FTP protocol will help her in uploading and downloading of files.

Description : Describe utility software and also define its types. -Technology

Last Answer : It is a system software designed to help in management and tuning of operating systems, computer hardwares and different application softwares.A single piece of utility software is usually called a ... file system which can be mounted by the operating system and treated as an individual drive.

Description : What is an accounting software and HR management system. Also, name the types of accounting software? -Technology

Last Answer : Accounting SoftwareThis system records and processes accounting transactions within functional modules such as accounts payable, accounts receivable, payroll and trial balance. It works as an accounting information ... and common in all organisations. e.g. Effective Staff, Cezanne HR etc.

Description : Table is also known as ………… . -Technology

Last Answer : Table is also known asrelation.

Description : Identify the error(s) in the following HTML code. Also, write the correct code. -Technology

Last Answer : The error in the code is that in place of color attribute there should be bgcolor.The correct code is

Description : Identify error(s) in the following HTML code. Also, write the correct code. type=“a” start=“d”> -Technology

Last Answer : tag’s attributes should be placed in between . In the list, the start attribute must be set to a numeric value and type attribute specifies ‘A’, ‘a’, T ‘i’ or ‘1’. So, the correct code is

Description : Hyperlinks can also be created for links within the same document. Linking -Technology

Last Answer : False Linking within the same document is called internal linking.

Description : When a folder is copied to another place, sub_folders in the folder also get copied. -Technology

Last Answer : TrueWhen a folder is copied to another place, all its sub-folders alongwith their contents also get copied.

Description : ……………… feature allows you to view different items such as comments, formatting etc. and also provides the option to view other author’s comments. -Technology

Last Answer : (c) Show Markup feature under Review tab allows you to view different items.

Description : Neha Mittal wants to store data of her montly expenditure for a period of two year and also wants -Technology

Last Answer : Microsoft Excel should be used because it cannot only be used for storing data but also be used to perform calculations and analysis of the data.

Description : What is the meaning of backup and why the data backup is essential? Also name 4 devices to take data backup. -Technology

Last Answer : In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original ... and natural disasterVirus attackFollowing are some storage devices to take backup:External hard diskCDDVDUSBFlash driveOnline Backup

Description : Mention any two main differences between HTML and XML. Also mention any two main features of XML for which it’s used extensively now a days. -Technology

Last Answer : Two main differences between HTML and XML:HTML is used to display data and to focus on formatting of data, whereas XML is used to describe data and focus on what data is.HTML tags are predefined, ... for which it's used extensively nowadays:XML is used to store data.XML is used to exchange data.

Description : Explain the purpose of pow() method with the help of suitable java code. Also mention that pow() method belongs to which class? -Technology

Last Answer : pow() method, a mathematical method, helps in calculating the power of any number.For example:int num=2,power=4;int ans=Math.pow(num,power);t1.setText(''+ans);The above code will calculate the value of 24 and will give answer 16.pow() method belongs to math class.

Description : Write down any one situation where waterfall software process can be used. Also mention one advantage and one disadvantage of waterfall -Technology

Last Answer : Situations to use/apply waterfall model(i) When project is small(ii) When problem is static.(iii) Clear and fixed requirements. Stable problem definition. Technology is static.Advantage :Simple and easy to understandDisadvantage :No working software till the last phase

Description : Write down any one situation where spiral delivery model can be used. Also mention one advantage and one disadvantage of spiral delivery model. -Technology

Last Answer : Situations to use/apply spiral model When project is large,When releases are required to be frequent,When risk and costs evaluation is important For medium to high-risk projectsAdvantage-Additional ... becomes easy as the prototype building is done in small fragmentsDisadvantage-Risk of not meeting

Description : Mention any two main differences between HTML and XML. Also mention any two main features of XML for which it’s used extensively now a days. -Technology

Last Answer : Two main differences between HTML and XML:HTML is used to display data and to focus on formatting of data, whereas XML is used to describe data and focus on what data is.HTML tags are predefined, whereas ... it's used extensively now a days:XML is used to store data.XML is used to exchange data

Description : How many rows and column will be there in the Cartesian product of the above given tables. Also mention the degree and cardinality -Technology

Last Answer : Cartesian Product:Number of Rows: 20Number of Columns: 9Degree: 9Cardinality: 20

Description : What are the regions associated with a particular phenotypic trait having polygenic effect called as? a. Junk DNA b. Alleles c. Quantitative trait loci d. Discrete variables

Last Answer : c. Quantitative trait loci

Description : Is there anything I can do about this sudden barrage of junk mail?

Last Answer : You can start a new email account.

Description : Did you know that today is National Junk Food Day?

Last Answer : Yes! And I ate pie a la mode with whipped cream at a diner with some friends earlier, and now I am regretting it! :-D ETA it’s also Hot Dog Day.

Description : Can one make a profit from extracting palladium and platinum from automobiles in junk yards?

Last Answer : It’s the recyclers who do that and make money. You couldn’t make enough trying to do it yourself.

Description : What is the one junk food you can't resist?

Last Answer : Chocolate cream pie loaded with whipped cream on top.

Description : Do you have a designated "junk drawer" in your house?

Last Answer : I’ve had a junk drawer in three states not in the same part of the country. I’ve never had anyone not understand the universal “junk drawer.”

Description : What junk food items did you eat when you were a kid?

Last Answer : My parents’ cooking. I would consider that junk food. As in, really horrible.

Description : Junk food- What’s your poison ?

Last Answer : Top Dog http://www.topdoghotdogs.com/

Description : What junk food do you put on your grocery list every week?

Last Answer :

Description : Under your roof, in your garage, etc. what percent of the stuff there is junk, what percent is actually something of worth or a true necessity?

Last Answer : answer:I’ve got a of pile of gold ingots, don’tcha know? Sometimes I go out and swim in it like Scrooge goddamn McDuck. Nah. Mostly books. Inside and in the storage shed. Lots and lots of books.

Description : What's the quickest, easiest way to sell my junk?

Last Answer : Facebook. I’m pretty sure that all counties have a buy/sell/trade page like this one.

Description : Does putting a ”free” sign on something give people more peace of mind abandoning their junk on the street?

Last Answer : Does it all disappear within a day? Do people who want it pick it up?

Description : Why isn't this junk program showing up in my install/uninstall programs list?

Last Answer : Cut the rope is popular game on mobile phones and is available on the pc. Does someone else use your pc? Have you downloaded any software? It could have been bundled with it. Some programs will not ... safe. If you delete it and it comes back or cannot manually delete it, it could be malicious.