The ________ command sends a copy of the email to everyone to whom the original email was sent
A) Forward: B) Reply All: C) Reply: D) Send:
B
Computer Science & Information Technology
You might also like to view...
The intersection of a row and column in a table is called a(n) ________
A) cell B) member C) element D) container
Computer Science & Information Technology
A security manager is preparing the training portion of an incident plan. Which of the following job roles should receive training on forensics, chain of custody, and the order of volatility?
A. System owners B. Data custodians C. First responders D. Security guards
Computer Science & Information Technology