All of the following are examples of Web-based e-mail services EXCEPT: ______.

A. FaceTime
B. Yahoo Mail
C. Google Gmail
D. Windows Live Mail


Answer: A

Computer Science & Information Technology

You might also like to view...

You want to edit the photo so that the waterfall is prominent. What technique do you use?

a. The rule of fifths b. The rule of fourths c. The rule of twos d. The rule of thirds

Computer Science & Information Technology

Built-in Word macros can be found from setting the Macros in drop-down list to ________ in the Macros dialog box

A) Word commands B) Global template C) All active templates and documents D) Normal.dotm

Computer Science & Information Technology

You have been asked to provide recommendations on the breakout of tasks for the development of a new product. Management thinks that by assigning areas of work appropriately the overall security of the product will be increased because staff will focus on their areas of expertise. You have been given a list of the groups and tasks. You must select the best assignments for each group. Groups: •

Networks • Development • Project Management • Security • Systems Engineering • Testing Tasks: • Decomposing requirements • Secure coding standards • Code stability • Functional validation • Stakeholder engagement • Secure transport Which task should you assign to the Security group? A. Secure coding standards B. Secure transport C. Code stability D. Stakeholder engagement

Computer Science & Information Technology

Unlike FORTRAN, COBOL, C, C++, and Ada, which were carefully developed as programming languages, ____________________, a modern, object-oriented language, was almost an accident.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology