The ________ command sends a copy of the email to everyone to whom the original email was sent

A) Forward: B) Reply All: C) Reply: D) Send:

B

Computer Science & Information Technology

You might also like to view...

The intersection of a row and column in a table is called a(n) ________

A) cell B) member C) element D) container

Computer Science & Information Technology

A security manager is preparing the training portion of an incident plan. Which of the following job roles should receive training on forensics, chain of custody, and the order of volatility?

A. System owners B. Data custodians C. First responders D. Security guards

Computer Science & Information Technology