.
Malicious code that includes virus and worms that can infect computers
Unwanted or unsolicited electronic messages
Software that runs at startup designed to take control of your computer
Security Prevention And Maintenance (S.P.A.M)
Pharming
Phishing
Spamming
Tracking
Flaming, and Mel should sent a hostile reply.
A legitimate request, and Mel should respond including all the required information.
Phishing, and Mel should promptly delete the message.
Spam, similar to other harmless, unsolicited email messages.
Flaming
Jabbing
Peering
Networking
Flash cookie
Tracker
Beacon
Third-party monitor
Non PII
PII
A user profile
Both A and B
Using reliable resources such as EBSCO and recognized news sites.
Using several different types of search engines.
Sticking to your topic and avoiding distractions.
All of the above.
Meta-search engines scan multiple search engine databases.
Meta-search engines are a waste of time becasue they provide very few results.
Meta-search engines provide results basd on the keyword(s) subited.
Meta-search engines can save time, but you shouldn't rely on them exclusively
Internet marketing
Internet AND marketing
Marketing ON internet
Marketing (internet)
To remember preferences such as volume settings for video
To allow you to watch videos on sites that use this Adobe tool
To track your activities online for the purpose of targeted advertising
All of the above
Track Really Special Sites (RSS).
Use a "reader" to review information compiled from a number of sources based on pre-selected preferences.
Send information to a number of Real-Time Syndicated Sources (RSS) for posting.
Access peer-to-peer communication by launching this Remote Surveillance System (RSS).
Wait!
Here's an interesting quiz for you.