A group of designs and backgrounds, fonts, and colors to add to your e-mail is called:

A) vCard B) signature C) stationery D) Image Viewer


C

Computer Science & Information Technology

You might also like to view...

Which of the following is the block cipher used by most TCP/IP applications that use that type of cipher?

A. Rivest Cipher 4 (RC4) B. Advanced Encryption Standard (AES) C. Data Encryption Standard (DES) D. Rivest Shamir Aleman (RSA)

Computer Science & Information Technology

A two-dimensional array can be viewed as

A) two rows of values. B) two columns of indexes. C) a table with rows and columns. D) any of the above. E) none of the above.

Computer Science & Information Technology

Suppose we have a struct called Employee, we have an object declared from the struct called emp, and we have a data member of the struct called salary. To access the salary data member of emp, we would use the code:

A. emp[salary] B. Employee.emp[salary] C. emp( salary ) D. emp.salary

Computer Science & Information Technology

Removing a password is also known as decrypting

Indicate whether the statement is true or false

Computer Science & Information Technology