Which of the following does not have features to scramble or unscramble e-mail addresses?
A. HTML
B. XHTML
C. XML
D. both a and b
Answer: D
Computer Science & Information Technology
You might also like to view...
When an entire message is encrypted for confidentiality using either symmetric or asymmetric encryption the security of the scheme generally depends on the __________ of the key.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which of the following is dependent upon determining human resources for the project?
A) economic feasibility B) operational feasibility C) tactical feasibility D) technical feasibility
Computer Science & Information Technology
If you use the normal copy and paste procedure you will ________ that object in the destination file
Fill in the blank(s) with correct word
Computer Science & Information Technology
Select the escape sequence that is used for a form feed:
A. \n B. \f C. /f D. /n
Computer Science & Information Technology