Deleting messages keeps them in the mailbox and on the server. How can they be removed from the server to reduce the quota? Check all that apply.
Left-click each message, and move it to the Trash folder.
Right-click the Deleted Items folder, and click Empty Folder.
Click the Folder tab, and click the Empty Folder in Clean Up group.
Right-click the Deleted Items folder, and click Mark All as Read.
In Backstage view, choose Cleanup Tools. Then, click Empty Deleted Items Folder.
Answer:
B, C, E are correct
Explanation:
Found on edg
Answer:
a,b,c,d
Explanation:
2021 i got it right
which of the following memory types cannot store the data for information permanently Ram chachi Flash Memory hard disk
Answer:
Memory hard disk is the answer
Answer: his answer is correct
Explanation:
In these ones all your finding is the mean(average).
What is the definition of a digital signal?
the push that makes electrons move in a wire; the greater the voltage, the stronger the push
a device that uses voice recognition to provide a service
communication of the binary data via the voltage level for each time interval
a device that converts one voltage to anoth
Answer:
communication of the binary data via the voltage level for each time interval
Explanation:
Answer:
communication of the binary data via the voltage level for each time interval
Explanation:
its on edge
If you are logged on to Windows Live Messenger, why would you be unable to engage
in an instant messaging session with your brother, who is logged on to his AOL
Instant Messenger account?
a. Because you use Windows and your brother uses Apple OS X
b. Because Windows Live Messenger has built-in security and AOL Instant
Messenger does not
c. Because AOL Instant Messenger and Windows Live Messenger use their own
proprietary protocols
d. Because AOL Instant Messenger encrypts
Answer:
C: Because AOL Instant Messenger and Windows Live Messenger use their own proprietary protocols
Explanation:
Why is it difficult to detect a Trojan horse?
Answer:
Explanation:
Because the virus disguises it self as something you are trying to download, then it attackes your device
Answer:
Since Trojan horses frequently appear disguised as legitimate system files, they are often very hard to find and destroy with conventional virus and malware scanners. ... The computer's antivirus and antimalware programs will be disabled and the necessary steps to remove malware will be inaccessible.
Explanation:
In general, a Trojan comes attached to what looks like a legitimate program. In reality, it is a fake version of the app, loaded up with malware. ... One form of Trojan malware has targeted Android devices specifically. Called Switcher Trojan, it infects users' devices to attack the routers on their wireless networks.
what is thesaurus?what do you mean by spell chek feature
Answer:
Thesaurous is a book that lists words in groups of synonyms and related concepts.
A Spell Checker (or spell check) is a Software feature that checks for misspellings in a text. Spell-checking features are often embaded in software or services, such as word processor, email client, electronic dictionary, or search engine.
Motivation is best defined as
the reason to achieve a goal.
O accomplishing a long-term goal.
O taking a break from a goal.
O the reason to compare a goal.
Answer:
a
Explanation:
the reason to achieve a goal
Motivation is best defined as the reason to achieve a goal. Thus, the correct option is A.
What is Motivation?Motivation is the cause of a behavior's initiation, continuation, or termination in humans and other animals at a certain time. Motivational states are frequently interpreted as internal forces that produce a disposition to participate in goal-directed activity in the agent.
Different mental states are said to compete with one another, and only the strongest state can determine behavior. This implies that we can be inspired to act even when we don't.
Desire is the classic example of a motivating mental state. However, several other states, such as goals or views about what one should do, can also serve as motivation.
The word "motive," which refers to a person's needs, wishes, wants, or drives, is the root of the word "motivation."
It is the process of inspiring people to act in order to accomplish a goal. In the context of career aspirations, psychological factors influencing people's behavior may include a desire for money.
Learn more about Motivation, here
https://brainly.com/question/951988
#SPJ6
Presentation slides should not have more than _____ bullet points.
Answer:
The answer is four
Explanation:
don't use more than four bullet points on any slide and will avoid using single bullet points on a slide.
Complete each sentence to describe features of the VLOOKUP function. The VLOOKUP function structure begins with =VLOOKUP( , …) To use the VLOOKUP function, the lookup value should be in the of the table.
Answer:
The complete sentences are:
The VLOOKUP function structure begins with =VLOOKUP(value, table, col_index, [range_lookup])
To use the VLOOKUP function, the lookup value should be in the first column of the table.
Explanation:
Required
Complete the given sentence with the right values
In Excel, the syntax of the VLOOK function is:
=VLOOKUP (value, table, col_index, [range_lookup])
value -> The value to look up to and it should be located in the first column of the table
table -> The table name
col_index -> The column number to check
[range_lookup] -> This is optional and it returns either true of false depending on the result of the query,
Answer:
Complete each sentence to describe features of the VLOOKUP function.
The VLOOKUP function structure begins with =VLOOKUP(lookup value, table array... )
To use the VLOOKUP function, the lookup value should be in the first column of the table.
Explanation:
Use the drop-down menus to describe how Adnan can add shapes to his presentation.
Which command group in the Insert tab should he click?
Which cursor would appear on the slide?
Which combination of actions should he take to insert the shapes on the slide?
Answer:
✔ Illustrations
✔ a crosshair
✔ left-click and drag
Explanation:
Answer:
1) Illustrations
2) a crosshair
3) left-click and drag
Explanation:
A linear representation of a hierarchical file directory is known as what?
Answer:
C.) a directory path
Explanation:
because I got it right.
____________ is related to the design of technologies to improve how people communicate with devices and applications to enter input and receive output.
Answer:
Human Computer Interaction
Explanation:
Human-Computer Interaction is related to the design of technologies to improve how people communicate with devices and applications to enter input and receive output.
What is computer interaction?Research on the design and application of computer technology that concentrates on the interfaces of humans and computers is known as the human-computer interface.
Experts in human-computer interaction (HCI) study how people use computers and develop solutions that let people use them in new and different ways.
The answer is Human-computer interaction.
Thus, Human-Computer Interaction is related to the design of technologies to improve how people communicate with devices and applications to enter input and receive output.
Learn more about computer interaction here:
brainly.com/question/3173766
#SPJ2
What is a good title for and about me project
Answer: MODERN TECHNOLOGY
Explanation: I don't know what your project is about, but I would assume since this is computer science that it is about technology.
Which of the following are examples of stakeholders?
a
Business Owners
b
Investors/Shareholders
c
Employees
d
All of the above
Why is user testing an important pat of the design process?
a) it helps you understand how the game is designed.
b) it helps you know how people use your game and what parts to improve.
c) it helps determine if team members are working well together.
d) it tells you how much people will pay for your game.
Answer:
The answer is A) it helps you understand how the game is designed.
Explanation:
User testing an important pat of the design process because it helps you understand how the game is designed. Thus, option A is correct.
What is a Game Deconstruction?Deconstruction doesn't technically mean "demolition"; rather, it refers to "breaking down" or "analyzing" something (particularly the words in a work of fiction or nonfiction) to determine its ultimate significance, which is allegedly nearly never exactly what the creator intended.
A typical deconstruction procedure starts by removing the building's windows, doors, appliances, and finishes, many of which can be recycled or sold again. The building is then taken apart, typically starting at the top and working down to the foundations.
Therefore, A "deconstruction" in games is a process that broadly refers to applying a rigorous, critical, and analytical examination to a work of media or art, frequently by disassembling it to better understand its constituent elements and how they interact.
Learn more about deconstruction process from
brainly.com/question/26087397
#SPJ6
List the basic computing and processing steps in order
Answer:
brainstoring and engeenerign process steps
Explanation:
because of science
Please help, this question is from plato.
How can you have a safe browsing experience?
Click pop-up advertisements to download software.
Select the option to delete cookies when you close the browser.
Enable JavaScript in your web browser.
Enable automatic download of software whenever the vendor offers a new update.
Disable automatic completion of username and passwords.
Answer:Enable javascript in your web browser
Explanation:
in most cases, letters of recommendation are required for admission to
Movie recommendations? I’m in middle school so nothing nasty bro and I don’t really like horror movies so none of those either
Answer:
watch happy gilmore
Explanation:
Answer:
Uh... My Sister's Keeper... 5 Feet Apart... The Fault in Our Stars.
Explanation:
give their answer according to the given in
Give short answer of the following questions.
1. What is the primary function of computer?
2. What does computer affect due to radiation?
3. What are electronic devices? Name any two electronic computers.
4. Write main two characteristics of Fourth Generation Computer.
5. Where are super computers mainly used?
Give long answer of the following questions:
1. Write any four disadvantages of using computer.
2. How are software classified into different types?
3. Define computer software. What are the types of application
Differentiate between the following:
1. Data and information
2. Second and third generation computer
3. General purpose and special purpose computers
internreter
Answer:SHORT ANSWER
3.) Electronic devices are components for controlling the flow of electrical currents for the purpose of information processing and system control. Any two electronic computers are - Digital computer and Electronic computers.
Think of an example in your life where a number could be described as data, information, and knowledge
Answer:
how many event you have been too in the last month (well non during this time but as an example)
Explanation:
Question # 6
Multiple Choice
Of the following examples, which would be the most significant benefit of advancements in touch-screen technology?
A basketball coach could demonstrate plays to his team in 3D, thereby creating a better visual image in the minds of the players.
A heart surgeon could practice a complicated procedure using a stylus and 3D image of a human heart.
A kindergarten student could drag and drop letters into their appropriate spots, creating a powerful educational link in their minds.
A scientist could break apart a 3D model of the human cell and study each part independently to get a better understanding of how the body works.
Answer:
Explanation:
basketball
Please select the word from the list that best fits the definition
A small farmer who did not own land
That would be a peasant, hope this helps ^^
Answer:
peasant
Explanation:
right on edge
What is the main disadvantage of parallel circuits?
Any break in the circuit stops the flow of charges.
There are multiple paths for charges to flow.
If one bulb goes out, the other bulbs will go out.
They are complicated to design and build.
Answer:
d
Explanation:
Answer:
D: They are complicated to design and build.
Explanation:
Question 5
1 pts
Which of the following numbers might this code generate: random.randint(1,9) ?
11
10
OO
D
Answer:
The answer to this question is given below in the explanation section.
Explanation:
This is a Python function that generates random number between the given range. However, it includes the numbers that are given in the range.
So this function can generate a random number and return a number between 1 and 9 (inclusive 1 and 9).
The function is written below
...........................................................................................................
import random
print(random.randint(1, 9))
#returns a number between 1 and 9 (both included)
.....................................................................................................................
When and how should internet service providers be allowed to treat some kinds of internet traffic different from others?
Answer:
When the content of the internet traffic is deemed unlawful the internet service provider can discriminate, block or slow down the internet traffic
Explanation:
The internet service providers have the right to block website that promote terrorists views or are used for recruitment by terrorists as well as other materials that are objectionable
The internet service providers can also discriminate against materials that are obscene, lascivious, indicate harassment, contains severe or exceptionally high violence based on preparation of materials to be published through them on the internet, according to a 1996 federal law
Internet service providers can also provide as zero rating sites that are exempted from requiring data allowance so that they can then be viewed for free by the client.
The Coins class was created to hold all your loose change, kind of like a piggy bank! For this exercise, you are going to simulate starting a bank with a specific number of coins, then adding to your piggy bank to bring your total to $2.12. What you need to do: Create a Coins object that initially has 4 quarters, 3 dimes, 2 nickels, and 1 penny. After you create the initial object, print out the total, then add coins to your bank until you have a total of 15 coins totaling 2.12. You will need to figure out which combination gets you to the correct total with the correct number of coins! When you are finished, call the method to print the bank count then the bank total to verify that you got the correct values.
Answer:
Coins c1 = new Coins (4, 3, 2, 1);
c1.bankValue();
c1.addQuarter();
c1.addQuarter();
c1.addDime();
c1.addDime();
c1.addPenny();
c1.bankCount();
c1.bankValue();
Explanation:
The best way to avoid distractions is to understand yourself. true or false?
Answer:
true
Explanation:
righttttttttttttttttttttttttttttttttttttt
Answer:
true
Explanation:
Question # 4
Multiple Choice
Which of the following is an example of planned obsolescence?
a smartphone company regularly updating cell signal technology
a television company building sets out of low-quality material
an online storage system upgrading storage capabilities
a computer software program regularly updating security
Answer:
the last one I think not 100% sure