Which of the following is not one of the options for determining how an end user might return a form to you?

A. Print
B. Fax
C. Website
D. Email


Answer: B

Computer Science & Information Technology

You might also like to view...

A common item of authentication information associated with a user is a ___________ .

A. nonce B. timestamp C. ticket D. password

Computer Science & Information Technology

What does the Microsoft term %systemroot% mean?

A) C: drive B) Boot partition C) Install CD-ROM D) MBD

Computer Science & Information Technology

____ begins with assertions and tries to match those assertions to the "if" clauses of rules.

A. Decision making B. Backward chaining C. Knowledge engineering D. Forward chaining

Computer Science & Information Technology

What are the prerequisites for a hash function to be classified as a secure cryptographic hash function?

What will be an ideal response?

Computer Science & Information Technology