An e-mail ____ identifies a user so that he or she can receive Internet e-mail.

A. address
B. profile
C. attachment
D. domain


Answer: A

Computer Science & Information Technology

You might also like to view...

Once a final version of a document has been accepted, it is a good idea to save it with a new name and delete the document with the tracked changes

Indicate whether the statement is true or false

Computer Science & Information Technology

Once a PivotChart has been created, you cannot modify it or change its location

Indicate whether the statement is true or false

Computer Science & Information Technology

The computer stores currently used programs and data in ________.

a. RAM b. ROM c. HDD d. CPU e. None of the above

Computer Science & Information Technology

COGNITIVE ASSESSMENT The term, payload, as it pertains to computer crime, is defined as _____________.

A. the money a criminal receives from extortion or other computer crimes B. the amount of data loss to a company or individual who is a victim of a computer crime C. the destructive event or prank the program is intended to deliver D. the financial burden computer crime places on its victims

Computer Science & Information Technology