A(n) ____ is keyed as the first line of the letter address.

A. attention line
B. blind copy notation
C. reference line
D. subject line


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the types listed below can be the type of a function output parameter?

a. int * b. double * c. char * d. all of the above e. none of the above

Computer Science & Information Technology

The ____ Tool lets you repair imperfections within a selected area using pixels from another area or by using a pattern.

a. Pattern b. Patch c. Clone d. Repair

Computer Science & Information Technology

An example of a(n) ____ reconnaissance attack is a user who utilizes tools such as a network sniffer to obtain information about a system or network infrastructure.

A. active B. passive C. dynamic D. static

Computer Science & Information Technology

Compressing a picture changes the amount of color used in the picture. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology