When sending an e-mail, the _____line describe the contents of the message:
a) Subject
b) Contents
c) CC
d) None of These

1 Answer

Answer :

a) Subject

Related questions

Description : When sending an e-mail, the … line describe the contents of the message a) Subject b) To c) Contents d) CC e) None of these

Last Answer : a) Subject

Description : When sending an e-mail, the _____ line describes the contents of the message. 1) to 2) subject 3) contents 4) CC 5) None of these

Last Answer : Answer :2

Description : When subroutine is called contents of program counter is location address of __ instruction following call instruction is stored on _ __and program execution is transferred to __ address. a. Non ... , Stack and Main program Cc. Executable, Queue and Subroutine d. Executable, Stack and Subroutine

Last Answer : d. Executable, Stack and Subroutine

Description : When you're sending an email, what is "cc"?

Last Answer : It stands for Carbon Copy. It means sending the same email to multiple people. BCC is Blind Carbon Copy. That is the same as CC but people can’t see the list of other people you sent the email too.

Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Sending an E-mail is similar to: a) Drawing a Picture b) Talking On the Phone c) Writing a Letter d) None of These

Last Answer : c) Writing a Letter

Description : Consider the following statements about Internet facility: 1) It serves as the largest one-line information system. 2) It provides the most dependable and latest mode for sending E-mail. 3) Recurring ... communication E-mail is very high. 4) It is often misused and has triggered cyber-crimes.

Last Answer : 1) It serves as the largest one-line information system

Description : An attackers can create an …....attack by sending hundreds or thousand of e-mail with very large attachment. a. Connection Attack b. Auto responder Attack c. Attachment overloading Attack d. All of the above

Last Answer : c. Attachment overloading Attack

Description : an attack can create and attack by sending hundreds or thousand of e-mail with very large attachment (a) connection attack (b) auto responder attack (c) attachment overloading attack (d) all of the above

Last Answer : (c) attachment overloading attack

Description : In which of the following areas, a spreadsheet software is more useful ? (1) Psychology(2) Publishing (3) Statistics (4) Message sending

Last Answer : Statistics

Description : Full Form of CC and BCC in E-mail -Technology

Last Answer : CC: Carbon Copy BCC: Blind Carbon Copy

Description : In webforms, how often do you see the absence of "CC me" or "Here is your message, and your comments have been submitted"?

Last Answer : I cant think of a single time that i’ve gotten a copy of my message sent to me except for perhaps once i receive a reply.

Description : Most mail programs automatically complete the following two parts in an email? a) From : and Body b) From : and Date c) From : and To: d) From : and Subject e) None of The Above

Last Answer : b) From : and Date

Description : Participate can see and hear each other in a/an: a) Electronic Mail System b) Message System c) Tele - Conference d) Bulletin Board e) None of The Above

Last Answer : c) Tele - Conference

Description : If you want to connect to your own computer through the internet from another location, you can use: a) E - Mail b) FTP c) Instant Message d) Telnet e) None of The Above

Last Answer : c) Instant Message

Description : A(n) _____ allows you to access your e-mail from anywhere. a) forum b) webmail interface c) message board d) weblog e) None of these

Last Answer : b) webmail interface

Description : When a real time telephone call between people is made over the Internet using computers, it is called a) a chat session b) an e-mail c) an instant message d) internet telephony e) None of these

Last Answer : d) internet telephony

Description : What are Difference between BC and CC option in composing mail?

Last Answer : CC... stands for Carbon Copy. Every person in the 'to' box gets the email - and they also are able to see who else the email was sent to.BCC... stands for Blind Carbon Copy. The procedure ... same as that described above - with the difference that each recipient does not see who else got the email.

Description : What should my greetings be when I'm sending an e-mail to a staff whose gender I don't know?

Last Answer : Dear friends and associates, Dear Sir/Madam, Ladies and gentlemen, and in a very formal way, though not often used – mesdames et messieurs.

Description : Sending the same e-mail to 9,000 customers at once?

Last Answer : Hi CroonerBill and welcome to Fluther. Unless you have a good system in place to prove that all the customers on your mailing list opted in to getting occasional emails about specials and such, it's best to ... you don't run afoul of the Can Spam Act and get your email account or IP address blocked.

Description : Question for songwriters: what are the inherent risks of sending original songs to your friends via e-mail?

Last Answer : This is why I never put up originals on my youtube. I’m afraid someone will steal my licks.

Description : Both Adium and sending E-mail through the native apple mail application don't function when i'm at school on their wireless. Anyone know why or how to fix it?

Last Answer : Does your school’s internet connect through a proxy? eg: When you open IE, does it ask you for a login?

Description : Is this story sending the wrong message (details inside)

Last Answer : I think that the more things change from one culture to another, the more things stay the same. If I had read that story, not knowing you are from Viet Nam, I would think it happened in the States some ... charges. Just promise me now, that you wont ever put up with crap like that from a man. OK?

Description : Do you think Zina Bash was sending some nefarious message with her OK sign?

Last Answer : Mosquito bite.

Description : In the interest of healthy eating, what sort of message is this sending out?

Last Answer : answer: taste is important Ironic, considering that the meat on their burgers has zero flavour, and the only flavour comes from the sauce, which can be described only as something . ... the children were disgusted at real strawberries, because they only ever ate artificial, chemical substitutes.

Description : What kind of message do you think this parent was sending to their kid?

Last Answer : Do you have a link?

Description : Was sending the Arecibo message a good idea or a bad one?

Last Answer : Hey, reaching out peacefully is always a good idea. And if it takes 25,000 years before it gets read, they won’t be in such a hurry to come attack us. And who know, we might be able to fend off anyone else by then.

Description : How can I stop someone from sending me a facebook message?

Last Answer : answer:Not that I’ve noticed, without doing what you said you don’t want to do. Why not just tell this person your PM…isn’t working? (It could happen, mine doesn’t show I have a PM half the time)

Description : How can I make money from sending a text message?

Last Answer : That’s about as likely as getting paid to poop.

Description : Is there any way, when sending a video through a facebook message, to download or share that video?

Last Answer : I would mess around with it, but I don’t have my webcam with me here. Did you try the Firefox Download Helper addon on the file? I mean, I assume you can play it? And when that’s happening, use the addon to get it. Tadah?

Description : When sending a text message, can you type numbers in the body of the message without changing the input format?

Last Answer : on my motorola phone I can just get to the numbers after I go through the letters on a given key (i.e. if I hit the #2 button, I can do A, B, C, then 2).

Description : You're sending a message in a bottle out to sea, what would you write?

Last Answer : We've been trying to reach you about your car's extended warranty

Description : You're sending a message in a bottle out to sea, what would you write?

Last Answer : We've been trying to reach you about your car's extended warranty

Description : How is sending sms different from sending a regular text message?

Last Answer : Sending SMS text is no different than sending a regular text message. They are the same thing. The difference is MMS. SMS means standard messaging service. MMS means media messaging service.

Description : Fax is used for– (A) Sending telephonic message (B) Sending copies of documents (C) Exercising control (D) Decision making

Last Answer : Answer: Sending copies of documents

Description : A _______ message tells an upstream router to start sending multicast messages for a specific groupthrough aspecific router. A) weed B) graft C) prune D) none of the above

Last Answer : graft

Description : A _______ message tells an upstream router to stop sending multicast messages for a specific group through aspecific router. A) weed B) graft C) prune D) none of the above

Last Answer : prune

Description : While sending a signed message, a sender a. sends message key using public key encryption using DES and hashed message using public key encryption b. sends message using public key encryption ... and hashed message using DES d. sends both message and hashed message using public key encryption

Last Answer : a. sends message key using public key encryption using DES and hashed message using public key encryption  

Description : Message can be sent more securely using DES by a. encrypting plain text by a different randomly selected key for each transmission b. encrypting plain text by a different random key for each ... instead of using hardware d. designing DES with high security and not publicizing algorithm used by it  

Last Answer : b. encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system

Description : If a student becomes unconscious during the period, what will you like to do? Options: A) Hurriedly rushing to the principal's office and canvassing for help impatiently B) Giving first aid to ... student's home and awaiting for his parents D) Making arrangements to send the student to his home

Last Answer : B) Giving first aid to the student and try to contact the school 's doctor 

Description : What is the full form of IMAP A)Internet Message Access Protocol B)Simple mail Transfer Protocol C)Internet Message Access Protocol D)None

Last Answer : A)Internet Message Access Protocol

Description : What is the full form of DNS A)Domain Name System B)Simple mail Transfer Protocol C)Internet Message Access Protocol D) Network Mapper

Last Answer : A)Domain Name System

Description : What is the full form of IMAP A)Internet Message Access Protocol B)Simple mail Transfer Protocol C)Internet Message Access Protocol D)None

Last Answer : A)Internet Message Access Protoco

Description : What is the full form of DNS A)Domain Name System B)Simple mail Transfer Protocol C)Internet Message Access Protocol D) Network Mapper

Last Answer : A)Domain Name System

Description : Mark the incorrect statement: (A) The postmaster should occasionally examine the paid contents of some of the mail bags opened in order to detect error in sorting (B) The PM ... to ascertain unnecessary detention (D) The PMr should occasionally examine the contents of Registered bags opened

Last Answer : (D) The PMr should occasionally examine the contents of Registered bags opened

Description : On receipt of information of highway robbery of mails, the Superintendent should take steps to obtain: (A) The place from where the mail was last despatched (B) List of bags prepared in that office at (A) ... from the offices of posting or dispatch (D) All information noted at (A), (B) and (C)

Last Answer : (D) All information noted at (A), (B) and (C)