Any email address placed in the ________ will be invisible to the recipients of your message.

A. to
B. bcc
C. subject
D. cc


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. If a program uses multiple classes from the same package, these classes can access each other's package access members directly through references to objects of the appropriate classes, or in the case of static members, through the class name. b. Package access is rarely used. c. Classes in the same source file are part of the same package. d. Use the access modifier package to give a method or variable package access.

Computer Science & Information Technology

What is the main advantage of using a thick client?

A. reduced cost of the machine B. can be used for purposes other than server-side virtualization C. does not require an operating system D. a tablet can serve as a thick client

Computer Science & Information Technology

When working with effects, its a good idea to hide the ____.

A. layers B. edges C. guides D. Smart Guides

Computer Science & Information Technology

Macros that can be used maliciously to erase or damage files are known as:

A) macro viruses. B) macro bugs. C) macro worms. D) VBA.

Computer Science & Information Technology