Outlook provides an easy way for managers to ____.

A. assign tasks
B. create new data sets
C. design tables
D. reorganize staff


Answer: A

Computer Science & Information Technology

You might also like to view...

When objects contain pointers, it is a good idea to create an explicit __________ function.

a. destructor b. copy constructor c. static constructor d. inline constructor e. None of these

Computer Science & Information Technology

A primary key can be left empty in a record when the database is saved

Indicate whether the statement is true or false

Computer Science & Information Technology

Howard is editing a manuscript for a publishing house. The manuscript was e-mailed to him as separate Word documents. Each document is a chapter of the manuscript.Howard decides that some text in Chapter Three of the manuscript should be moved to Chapter Two. One way for Howard to move the text is to use the ____ commands.

A. Copy and Paste B. Cut and Copy C. Copy and Replace D. Cut and Paste

Computer Science & Information Technology

Why is a rogue AP a security vulnerability?

A. It uses the weaker IEEE 80211i protocol. B. It conflicts with other network firewalls and can cause them to become disabled. C. It allows an attacker to bypass network security configurations. D. It requires the use of vulnerable wireless probes on all mobile devices.

Computer Science & Information Technology