Some Web-based encrypted e-mail systems—such as the popular free ____ service—require both the sender and recipient to have accounts through that system.

A. CryptMail
B. Quietmail
C. Hushmail
D. PrivateMail


Answer: C

Computer Science & Information Technology

You might also like to view...

Using ________ enables the user to select a group of individual slides

A) [Ctrl] B) [Alt] C) [Ctrl]+[Shift] D) [Shift]

Computer Science & Information Technology

A(n) _____ helps with an increase in power, but not a decrease

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is a characteristic of wet pipe fire suppressions systems?

a. Water held back by a clapper b. Always contains water c. Air blows out of a pipe; the water flows d. Preferred for computer installations

Computer Science & Information Technology

Case 2-2 You and Ellen are cramming for your exam about the second phase of the program development life cycle, the design of the user interface. Ellen tells you the percentage of program design time that developers spend on the user interface. You think that she is exaggerating but then you double-check and see that she is right. What range does she give you?

A. 25 percent to 40 percent B. 30 percent to 48 percent C. 35 percent to 60 percent D. 39 percent to 70 percent

Computer Science & Information Technology