In a business letter the ________ character follows the greeting line
A) comma B) chevron C) colon D) semi-colon
C
Computer Science & Information Technology
You might also like to view...
If the file extensions are turned off, you can identify the file type by its ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
To perform a task for a given state of a MediaPlayer, you specify an object that imple- ments interface __________ (package java.lang).
What will be an ideal response?
Computer Science & Information Technology
Which type of attack refers to the use of human interaction to gain access to a system or to do damage.
A. social engineering B. psychological warfare C. inside attack D. spoofing
Computer Science & Information Technology
Lion is used to run ____ software.
A. operating B. tracking C. application D. vision
Computer Science & Information Technology