Which of the following does not have features to scramble or unscramble e-mail addresses?

A. HTML
B. XHTML
C. XML
D. both a and b


Answer: D

Computer Science & Information Technology

You might also like to view...

When an entire message is encrypted for confidentiality using either symmetric or asymmetric encryption the security of the scheme generally depends on the __________ of the key.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is dependent upon determining human resources for the project?

A) economic feasibility B) operational feasibility C) tactical feasibility D) technical feasibility

Computer Science & Information Technology

If you use the normal copy and paste procedure you will ________ that object in the destination file

Fill in the blank(s) with correct word

Computer Science & Information Technology

Select the escape sequence that is used for a form feed:

A. \n B. \f C. /f D. /n

Computer Science & Information Technology