In a business letter the ________ character follows the greeting line

A) comma B) chevron C) colon D) semi-colon


C

Computer Science & Information Technology

You might also like to view...

If the file extensions are turned off, you can identify the file type by its ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To perform a task for a given state of a MediaPlayer, you specify an object that imple- ments interface __________ (package java.lang).

What will be an ideal response?

Computer Science & Information Technology

Which type of attack refers to the use of human interaction to gain access to a system or to do damage.

A. social engineering B. psychological warfare C. inside attack D. spoofing

Computer Science & Information Technology

Lion is used to run ____ software.

A. operating B. tracking C. application D. vision

Computer Science & Information Technology