________ let Outlook know where to place specific emails based on their subject lines, who sent them, or the importance of the message

A) Inbox Rules B) Themes C) More actions D) Email signatures

A

Computer Science & Information Technology

You might also like to view...

The process of accessing a computer from outside of a company is referred to as ________

A) outsourcing B) ergonomics C) hacking D) hop-off gateway

Computer Science & Information Technology

Examples of circumstantial evidence that can be used to authenticate a physical document include all of the following EXCEPT

A) The document's appearance B) The document's content C) The document's substance D) The application that created the document

Computer Science & Information Technology