An efficient method of communication when more than one person is involved in the editing process of a document is to use ________
A) notes B) e-mail C) comments D) suggestions
C
You might also like to view...
Answer the following statements true (T) or false (F)
1. For network based user authentication the most important methods involve cryptographic keys and something the individual possesses, such as a smart card. 2. There are a variety of problems including dealing with false positives and false negatives, user acceptance, cost, and convenience with respect to biometric authenticators. 3. Any timestamp based procedure must allow for a window of time sufficiently large enough to accommodate network delays yet sufficiently small to minimize the opportunity for attack. 4. An e-mail message should be encrypted such that the mail handling system is not in possession of the decryption key. 5. Because there are no potential delays in the e-mail process, timestamps are extremely useful.
What is Internet Explorer's scripting language called?
A. IEScript B. VBScript C. Oak D. JavaScript
Processes are generally very simple.
Answer the following statement true (T) or false (F)
A ________ is a separate area of a window
A) gallery B) view C) preview D) pane