To contact people using the Internet, you most often use their ____.

A. domain names
B. e-mail addresses
C. usernames
D. passwords


Answer: B

Computer Science & Information Technology

You might also like to view...

Both GFS and Bigtable make the same core design choice – to have a single master. What are the repercussions of a failure of this single master in each case?

What will be an ideal response?

Computer Science & Information Technology

The command prevents programmers from accidentally altering the size and location of the Form’s controls.

a) Lock Controls b) Anchor Controls c) Lock d) Bind Controls

Computer Science & Information Technology

Write a code fragment that reads and prints integer values entered by a user until a particular sentinel value (stored in SENTINEL) is entered. Do not print the sentinel value.

What will be an ideal response?

Computer Science & Information Technology

Excel displays a green arrow in the top left corner of a cell if it detects no possible error

Indicate whether the statement is true or false

Computer Science & Information Technology