answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astra-53 [7]
2 years ago
13

Nancy would like to configure an automatic response for all emails received while she is out of the office tomorrow, during busi

ness hours only. What should she do?
Computers and Technology
2 answers:
Stella [2.4K]2 years ago
4 0

she can appoints someone she trust to act on her behalf

krek1111 [17]2 years ago
4 0
In your email settings you can configure “automatic reply” to incoming emails received. You can use default replies or customize your own reply.
You might be interested in
Which of the following people is required by law to wear a seat belt? A. The operator of a truck weighing more than 26,000 lbs B
mars1129 [50]
A, because you can't wear a seat belt if you are throwing newspaper out the car, school buses don't have seat belts and neither did trucks back in the 70's
3 0
2 years ago
A small company is moving towards sharing printers to reduce the number of printers used within the company. The technician has
Misha Larkins [42]

Answer:

Security risk associated with sharing a printer are

  1. Printer Attacks
  2. Theft
  3. Breach of data
  4. Vulnerable Network

Explanation:

Printer Attacks

A network printer can be used for a DDoS attack.As printer are not very secured and are a weak link in network these can be easily exploited by the hackers for any kind of malicious activities and even lanching a DDoS attack.

DDoS attack is denial of service attack in which network is flooded with malicious traffic which cause it to choke and make it inaccessible for users.

Theft

Physical theft of document can be an issue.Anyone can just took printed pages from printer tray by any one.

Breach of Data

The documents which are printed are usually stored in printer cache for some time which can be accessed by any one connected to the network. Any document containing confidential information which are printed on network printer can fall in wrong hands.

Vulnerable Network

As mentioned a single unsecured network printer can pose great threat to entire network as it can provide a way into the network.

8 0
2 years ago
In the game of $Mindmaster$, secret codes are created by placing pegs of any of seven different colors into four slots. Colors m
Artemon [7]

In the game of $Mindmaster$, secret codes are created by placing pegs of any of seven different colors into four slots. Colors may be repeated, and no slot may remain empty. 2401 secret codes are possible.

<u>Explanation:</u>

Mastermind is a board game that was developed by Mordecai Meirowitz, in 1971. The Code maker sets a secret code, then the Codebreaker attempts to meet the code using logic, deduction. Behind each move, the Code maker provides hints to the Codebreaker. Make the code even more indirect by using multiple pegs of the same color or by leaving one or more peg holes empty. With so many feasible code sequences, every game is confirmed to be a brain teaser.

7 colors with 4 slots and repetition of color are accepted so 7^4 is 2401.

3 0
1 year ago
Joe, Kate and Jody are members of the same family. Kate is 5 years older than Joe. Jody is 6 years older than Kate . The sum of
mezya [45]

Answer:

5, 10 and 16

Explanation:

The sum of their ages is √961 = 31

If Joe is x years old, the equation that follows is:

x + (x+5) + (x+5+6) = 31

This simplifies to

3x = 31 - 11 - 5 = 15

so x=5

From that you can find

Joe = x = 5

Kate = x+5 = 10

Jody = x+5+6 = 16

5 0
2 years ago
Read 2 more answers
A data center designer requested additional lighting for the entrance to the data center as well as the removal of a object whic
Ira Lisetskai [31]

Answer:

SURVEILLANCE-SPECIFIC DESIGN.

Explanation:

Defensible space offers a series of architectural guidelines that can be used in the design of new urban residential complexes to promote both the residential group’s territorial claim to its surroundings and its ability to conduct natural surveillance. The designs are: site interrelationship design, site design, street design and surveillance-specific design.

Surveillance-specific design can be used to increase general visibility by providing adequate lighting, by reducing or eliminating physical barriers to visibility, and by the visibility-promoting location of key areas (entrances, lobbies, elevator waiting areas, parking areas e.t.c.) so as to be directly visible from as many viewpoints as possible.

Since the data center designer requested additional lighting for the entrance to the data center as well as the removal of a object which is blocking security's view of the entrance, then it is an example of SURVEILLANCE-SPECIFIC DESIGN.

6 0
1 year ago
Other questions:
  • When seeking information on the internet about a variety of subjects the most useful place to look would be?
    13·2 answers
  • Copy the 10 statements as they appear below into your journal.
    6·2 answers
  • Isabel is creating a wireframe. She has drawn a layout for the home page along with outlining the navigation elements. She now w
    15·2 answers
  • Sara is having a tough time finding the cause of a problem on a computer she is troubleshooting. She found a possible problem bu
    15·1 answer
  • In cell J4, calculate
    8·1 answer
  • Consider the packets exchanged in TCP connection setup between Host A and Host B. Assume that Host A's initial sequence number i
    7·1 answer
  • 1. Assign to maxSum the max of (numA, numB) PLUS the max of (numY, numZ). Use just one statement. Hint: Call FindMax() twice in
    7·1 answer
  • You have an on-premises network that contains several servers. You plan to migrate all the servers to Azure. You need to recomme
    14·1 answer
  • What does the binary odometer show about representing large numbers​
    15·1 answer
  • When authenticating a user's password, the password supplied by the user is authenticated by comparing the ____ of the password
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!