Which protocol is used to transmit e-mail over the Internet?

A) FTP
B) SMTP
C) HTTP
D) VoIP


B

Computer Science & Information Technology

You might also like to view...

The specific purpose of the ____ is to implement the education and training requirements of the National Strategy to Secure Cyberspace.

A. TBK B. EBK C. ABK D. NBK

Computer Science & Information Technology

When the TDC is bound to an element, the element's DATASRC attribute should be set to ________.

a) the name of the TDC object preceded by a user defined character b) the filename containing the data c) the field name that the data is in d) the name of the TDC object preceded by a #

Computer Science & Information Technology

In the following code, how many Rectangle objects are instantiated?Rectangle rect1;Rectangle rect2;Rectangle rect3 = null;Rectangle rect4 = new Rectangle(3.0, 1.5);

A. 0 B. 1 C. 2 D. 3

Computer Science & Information Technology

You can edit existing conditional formatting rules from the Conditional Formatting _____ dialog box. Click the Edit Rule button and make the appropriate changes.

A. Rules Editor B. Rules Manager C. Editor D. Manager

Computer Science & Information Technology