A list of rules that identify suspected spam messages in Vista is called a(n) ________

Fill in the blank(s) with correct word


junk e-mail filter

Computer Science & Information Technology

You might also like to view...

The first step that programmers follow when they solve problems is to plan the algorithm.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is a design element?

A) color B) shape C) font D) All of the above.

Computer Science & Information Technology

To use SkyDrive, you must have a Microsoft account

Indicate whether the statement is true or false

Computer Science & Information Technology

You can use the jQuery Mobile ____ widget to provide the streamlined appearance typical of mobile sites.

A. Accordion B. Streamline C. Condenser D. Collapsible Block

Computer Science & Information Technology