A(n) ____ is a list of items to be discussed in a meeting.

A. summary
B. agenda
C. prelude
D. synopsis


Answer: B

Computer Science & Information Technology

You might also like to view...

What practice under the BSIMM involves the detection and correction of security flaws, providing sanity checks and internal/external tests?

A. Deployment - Penetration testing B. SSDL Touchpoints - Security testing C. Deployment - Software environment D. Deployment - Security checks

Computer Science & Information Technology

The intermediate Stream operation ________ results in a stream containing only the elements that satisfy a condition

a condition. a. distinct b. map c. filter d. limit

Computer Science & Information Technology

The vi command Ctrl g

a: places the cursor at the end of the file b: places the cursor at the top of the file c: cancels last changes on the current line d: scrolls the cursor down one page e: displays the line number of the current line

Computer Science & Information Technology

After you save a document as a computer file, it is in storage.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology