answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crank
2 years ago
14

Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What shoul

d he do?
A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.
Computers and Technology
2 answers:
sergey [27]2 years ago
3 0
A or C not really sure but I want to help.
drek231 [11]2 years ago
3 0

Answer:

C. Configure a safe sender

Explanation:

It’s dabest thing to do

You might be interested in
Darcy is creating an instructional manual for her employees. She entered the text in a word processing program and wants to impo
NeX [460]
When Darcy finish creating the instructional manual for her employees, she can copy paste her content from the word processing program to DTP by :
a) Press Ctrl a to select all the content from the word processing program;
b) Press Ctrl c to copy everything from the word processing program;
c) open DTP
d) Press Ctrl v to paste everything, word by word, page by page from the word processing program to DTP.
5 0
2 years ago
1)When the liquid is spun rapidly, the denser particles are forced to the bottom and the lighter particles stay at the top. This
Delvig [45]

Answer:

Centrifugation.

Explanation:

When the liquid is spun rapidly, the denser particles are forced to the bottom and the lighter particles stay at the top. This principle is used in centrifugation.

Centrifugation can be defined as the process of separating particles from a liquid solution according to density, shape, size, viscosity through the use of a centrifugal force. In order to separate these particles, the particles are poured into a liquid and placed in a centrifuge tube. A centrifuge is an electronic device used for the separation of particles in liquid through the application of centrifugal force. Once the centrifuge tube is mounted on the rotor of the centrifuge, it is spun rapidly at a specific speed thereby separating the solution; denser particles are forced to the bottom (by moving outward in the radial direction) and the lighter particles stay at the top as a result of their low density.

6 0
2 years ago
In the graph shown here, by what percentage are the number of people in computer occupations in general projected to increase?
SOVA2 [1]

Answer:

12% or 21%

Explanation:

not really sure

8 0
2 years ago
Read 2 more answers
[20 points] 3.3 Code Practice: Question 2
igor_vitrenko [27]

Answer:

See explanation

Explanation:

The attachment show that you've attempted the question already.

I'll assist in making corrections to your source code.

First, edit line 5 to

if(r<= 255 and g<=255 and b <=255):

Then edit line 8 to:

if(r>= 255):

Then edit line 11 to:

if(g>= 255):

Lastly, edit line 14 to:

if(b>= 255):

<em>Other part of the attachment is correct</em>

3 0
2 years ago
Drag the tiles to the correct boxes to complete the pairs.
-BARSIC- [3]

1) ECPA is D. Prohibits the government and law enforcement agencies from acquiring information about an individual through telephonic or digital media.

2) COPPA is C. Restricts websites from acquiring information from users below the age of thirteen.

3) OPPA is A. Directs company websites to declare their privacy policies and their expiration dates on their websites if the users are from California.

4) FCRA is B. Regulates credit ratings and how agencies view an individual's credit information.

8 0
2 years ago
Read 2 more answers
Other questions:
  • Consider a simple application level protocol built on top of udp that allows a client to retrieve a file from a remote server re
    15·2 answers
  • Which of the following describes ETL? a) A process that transforms information using a common set of enterprise definitions b) A
    14·1 answer
  • Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log o
    12·1 answer
  • When configuring a record type, an App Builder can configure the available value of a picklist field for the page layout. Which
    9·1 answer
  • Suppose that, even unrealistically, we are to search a list of 700 million items using Binary Search, Recursive (Algorithm 2.1).
    11·1 answer
  • Without using any additional variables, and without changing the values of ndays or the elements of the parkingTickets array, wr
    14·1 answer
  • 5.6 Look carefully at how messages and mailboxes are represented in the email system that you use. Model the object classes that
    14·1 answer
  • Which argument forces a writer to return to and change the input before resolving a “UnicodeError”?
    10·1 answer
  • What email server does Global Enterprises use?
    7·1 answer
  • Which are technical and visual demands that need to be considered when planning a project? Choose three answers
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!