In the Safe Senders tab in the Junk Email Options dialog box, Outlook recommends that you type the ____ symbol to indicate a domain name.

A. @
B. #
C. html
D. http


Answer: A

Computer Science & Information Technology

You might also like to view...

An organization's main assets consist of intellectual property rather than plants, buildings, or expensive computer hardware.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following cannot be changed using the Handout master page?

A) The location of fields on the page B) Where the thumbnails appear on the page C) How many thumbnails are on the page D) The orientation of the page

Computer Science & Information Technology

Biometric devices, such as finger scanners, consist of:

A. a reader or scanning device B. software C. a database D. A, B, and C E. procedures

Computer Science & Information Technology

Wired equivalent privacy (WEP) is intended to guard one of the three CIA characteristics of information, namely ____.

A. confidentiality B. integrity C. availability D. non-repudiation

Computer Science & Information Technology