Browse Definitions :
Quiz

Quiz: E-mail Marketing and the Spam Problem

How many can you guess without peeking? Quiz yourself and find out!

1. This is a technique used by legitimate marketers to customize offerings for specific customers.
See answer.

2. Used by spammers to make recipients think a message came from someone other than them, this technique might convince a user that spam came from someone they'd actually like to hear from.
See answer.

3. This is the term for a message returned to the sender by the recipient's server as undeliverable, often because the message is -- rightly or wrongly -- determined to be spam.
See answer.

4. A type of Web-based marketing this type of e-mail allows recipients to buy goods and services directly from an e-mail message, without being redirected to the retailer's Web site.
See answer.

5. This self-explanatory term is a more formal way of saying "spam."
See answer.

6. This is a term for the number of times that users click on links in a message or on a Web site -- it's much higher for legitimate marketing e-mails than for spam.
See answer.

7. This is a program used to detect unwanted messages. A frequent problem is that they may also prevent delivery of some legitimate messages.
See answer.

8. In this type of e-mail campaign, advertisements are sent to targeted groups of customers.
See answer.

9. Also known as permission-based e-mail, this is one proposed requirement for marketers that could greatly decrease the amount of spam.
See answer.

10. Never used by legitimate marketers, this is a type of program that a spammer uses to troll the Internet seeking e-mail addresses.
See answer.

This was last updated in August 2009
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close