In Lync, a list of contacts listed beneath a heading is called a(n) contact ________

A) group B) availability window
C) section D) filter


A

Computer Science & Information Technology

You might also like to view...

The process of converting a wrapper class object to a primitive type is known as __________.

a. simplifying b. unboxing c. parsing d. devaluating

Computer Science & Information Technology

A ____________ copy of an object is a copy that has no references in common with the original object.

a. bit copy b. deep copy c. shallow copy d. none of the above

Computer Science & Information Technology

Recently, your organization adopted several new security policies. What should do to determine that the new policies are followed?

A. Review organizational procedures and processes. B. Review international standards. C. Identify the risks of the new security policies. D. Identify the technologies that have changed.

Computer Science & Information Technology

The second-generation PCS cell phone technology used both GSM and ____________________ technology.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology