________ let Outlook know where to place specific emails based on their subject lines, who sent them, or the importance of the message
A) Inbox Rules B) Themes C) More actions D) Email signatures
A
Computer Science & Information Technology
You might also like to view...
The process of accessing a computer from outside of a company is referred to as ________
A) outsourcing B) ergonomics C) hacking D) hop-off gateway
Computer Science & Information Technology
Examples of circumstantial evidence that can be used to authenticate a physical document include all of the following EXCEPT
A) The document's appearance B) The document's content C) The document's substance D) The application that created the document
Computer Science & Information Technology