Critical Thinking QuestionsCase 1-1Your friend Frank has just received an e-mail message that a colleague sent to all of the members of Frank's department. Frank is new to Outlook, so he asks for help in processing the message.Frank wants to send a quick acknowledgment to his colleague, informing her that he received the message. However, he does not want the other recipients to see his acknowledgement. Which Outlook response option should he use?
a. Acknowledgec. Reply Allb. Replyd. Forward
What will be an ideal response?
Answer: B
You might also like to view...
Answer the following statements true (T) or false (F)
1. The Diffie-Hellman key exchange is a simple public-key algorithm. 2. The security of ElGamal is based on the difficulty of computing discrete logarithms. 3. For purposes of ECC, elliptic curve arithmetic involves the use of an elliptic curve equation defined over an infinite field. 4. The Diffie-Hellman algorithm depends on the difficulty of computing discrete logarithms for its effectiveness. 5. There is not a computational advantage to using ECC with a shorter key length than a comparably secure TSA.
Critical Thinking Questions Case Study H-1Geoff Palmer is in the middle of an extensive Photoshop project -- an online tribute for his daughter's birthday. He thought the project would take a day or two at the most, but it has become much more than that. Geoff realized that it was possible to set the ____ panel to automatically save a ____ every time he saved his work.
A. Tools, version B. History, photo C. History, snapshot D. Applications, copy
When an object has been created from a class, we say that a(n) _______________ of the class has been created.
Fill in the blank(s) with the appropriate word(s).
The best way to control how a pattern fills an object is to align the ruler origin with the bottom-left corner of the object.
Answer the following statement true (T) or false (F)