Any email address placed in the ________ will be invisible to the recipients of your message.
A. to
B. bcc
C. subject
D. cc
Answer: B
You might also like to view...
Which of the following statements is false?
a. If a program uses multiple classes from the same package, these classes can access each other's package access members directly through references to objects of the appropriate classes, or in the case of static members, through the class name. b. Package access is rarely used. c. Classes in the same source file are part of the same package. d. Use the access modifier package to give a method or variable package access.
What is the main advantage of using a thick client?
A. reduced cost of the machine B. can be used for purposes other than server-side virtualization C. does not require an operating system D. a tablet can serve as a thick client
When working with effects, its a good idea to hide the ____.
A. layers B. edges C. guides D. Smart Guides
Macros that can be used maliciously to erase or damage files are known as:
A) macro viruses. B) macro bugs. C) macro worms. D) VBA.