Which of the following applications is included with Microsoft Office Standard 2010?

A. SharePoint Workspace
B. InfoPath
C. Communicator
D. OneNote


Answer: D

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. A widely used technique for pseudorandom number generation is an algorithm known as the linear congruential method. 2. A cryptographically secure pseudorandom bit generator is defined as one that passes the least significant bit test. 3. The security of Blum, Blum, Shub is based on the difficulty of factoring n. 4. The stream cipher is similar to the one-time pad with a difference being that a one-time pad uses a pseudorandom number stream and a stream cipher uses a genuine random number stream. 5. The longer the keyword the more difficult the cryptanalysis.

Computer Science & Information Technology

Which of the following is the command used to display currently open ports on a Windows operating system?

a. netstat -a b. netstat -r c. netstat -o d. netstat - a

Computer Science & Information Technology

The advantage of using a list of pointers is that logical groups of data headings can be collected and accessed with one array name.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What command would a technician use to see all the connections including port numbers being used by a computer?

A) ping B) ipconfig C) net share D) netstat E) nslookup

Computer Science & Information Technology