You can use a ____to specify the email messages from a particular user be categorized automatically or placed in a specified folder.

A. rule
B. stipulation
C. dictate
D. signature


Answer: A

Computer Science & Information Technology

You might also like to view...

____ data about the performance of security processes and technologies can give managers all of the guidance they need to make informed decisions about how to steer the course.

A. Subjective B. Skewed C. Objective D. Qualitative

Computer Science & Information Technology

You cannot use most ____ software to join files or tables together and create a relational database.

A. spreadsheet B. database C. desktop publishing D. word processing

Computer Science & Information Technology

Describe a packet-filtering scenario that works with the DMZ.

What will be an ideal response?

Computer Science & Information Technology

To be sure an algorithm works correctly, you should desk-check it several times using which of the following?

A. valid data only B. invalid data only C. both valid and invalid data D. invalid data only if valid data works correctly

Computer Science & Information Technology