Figure OL 4-1 In the accompanying figure, the Networking group listed is a ____.

A. contact
B. deleted contact
C. contact group
D. business card


Answer: C

Computer Science & Information Technology

You might also like to view...

static member functions:

a. Can use the this pointer. b. Can access only other static member functions and static data members. c. Cannot be called until an object of their class is instantiated. d. Can be declared const as well.

Computer Science & Information Technology

An Excel spreadsheet can be embedded directly into a PowerPoint presentation

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is an example of a lack of computer security?

A) Spam B) Air conditioning failure C) Employee death D) Chemical spill

Computer Science & Information Technology

Which of the following is the core of an operating system that maintains the computer's clock, starts applications, and assigns the computer's resources, such as devices, programs, apps, data, and information?

A. cell B. grid C. nexus D. kernel

Computer Science & Information Technology