________ messages is a good method to document a conversation

A) Deleting B) Saving C) Printing D) Forwarding


C

Computer Science & Information Technology

You might also like to view...

In an Earned Value table, positive variance indicates that you are over budget.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

An easy way to determine if a hash contains any key-value pairs is to execute the full? method.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The background color does not correspond to the CSS background-color property.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Microsoft has used DNS names with the __________ protocol to provide folder and printer sharing in small TCP/IP networks.

A. SMB B. Samba C. NetBIOS D. NetBT

Computer Science & Information Technology