Short Answer
In ____________________,a perpetrator sends an excessive amount of unwanted e-mail messages to someone.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q38: How does public key cryptography work?
Q39: A computer _ is a small program
Q40: _ cable represented a major improvement in
Q41: A _ is a common Internet tool
Q42: The _ is the data after the
Q44: Auditing a computer system is often a
Q45: Many people consider the Trojan horse to
Q46: _ is the name of a particularly
Q47: In computer terminology,a(n)_ is a trap that
Q48: Public key cryptography is also called _