________ is a personal information manager

A) PowerPoint B) OneNote C) Word D) Outlook


A

Computer Science & Information Technology

You might also like to view...

Which of the following is true of an Ethernet hub?

A. It works as an amplifier to boost signal strength. B. It reads a signal coming in from one port and repeats the signal out to the other ports. C. It reduces the collisions on an Ethernet network. D. It sends the same signal back down the port that originally sent it.

Computer Science & Information Technology

Malicious tampering occurring internally by a disgruntled employee can subtly alter data that may not be noticed for some time after the employee leaves the company

Indicate whether the statement is true or false

Computer Science & Information Technology

When using a touch screen, how do you bring up system commands?

A) press and hold B) slide C) swipe from lower right edge D) pinch and stretch

Computer Science & Information Technology

What is the default data type when creating an Access table?

A) Text B) Short text C) Long text D) Number

Computer Science & Information Technology