1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wel
2 years ago
13

Debbie can use the feature in the email to copy her manager on the email without her colleague knowing she did so

Computers and Technology
1 answer:
zepelin [54]2 years ago
8 0
Debbie can use the BCC feature (Blind Carbon Copy)
You might be interested in
What should you do when you are working on an unclassified system and receive an email.
koban [17]

Answer:

Don't respond to it. Either leave it there, or just delete it. It is most likely spam or a scammer trying to get your information. Don't respond, please.

3 0
2 years ago
When an important file is saved on two different computers, what is the name of the file that is housed on the second computer?
OleMash [197]
When an important file is saved on two different computers, the name of the file that is housed on the second computer is 'back up'. Back up refers to the process of copying and archiving a particular computer data in order to have an extra copy to fall back on in the event of data loss.  <span />
5 0
3 years ago
What types of storage can be used to access data from another computer
Aleksandr-060686 [28]
<span>Hard disk drives
</span><span>RAM<span>Random access memory (RAM)
</span></span><span>External hard disks
<span>USB port
</span></span>CD and DVD drives
<span>Memory cards</span>
6 0
3 years ago
Read 2 more answers
A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed throu
alexgriva [62]

Answer:

Internet Control Message Protocol (ICMP) Echo Requests

Explanation:

A system that has Windows Firewall or antivirus or other third party antivirus enabled with their configuration setting set to default, ping command from another device will not be able to see if the device with an enabled firewall is alive.

The ping command sends Internet Control Message Protocol (ICMP) Echo Request to a destination device after the destination device will reply with a Reply packet. However, by default, firewalls, such as Windows firewall blocks ICMP Echo Requests from the external network and pinging will  work when the firewall is disabled or an exception is created that lets ICMP Echo Requests pass through the firewall.

4 0
3 years ago
You are planning to install Windows 10 on a computer in a dual-boot configuration. The computer already has Windows 8 installed.
aniked [119]

Answer:

Shrink the primary partition and create a simple volume for Windows 10.

Explanation:

The EFI’s partition space, after it is shrunk, will not be enough to install your Windows 10 since by default; it can only hold a maximum space of about 250MB to 500MB. Some windows versions call this partition EFI while others refer to it as system reserved. Windows uses EFI partition to hold on to essential components that make your PC boot like boot loaders, system utilities, and a few more.

The answer is B.

When you shrink your volume, whether it is local disk C or a primary partition with plenty of free space, it will create unallocated space. Right click on the unallocated space and create a New Simple Volume that will let you format your partition, assign a drive letter, and install your Windows 10 Operating System.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Who are the founders of video-sharing site Dailymotion?
    7·1 answer
  • Write the execution steps if the input is a lion.
    11·1 answer
  • You are going to be installing a videoconferencing system. One of the requirements of the system is that only workstations that
    10·1 answer
  • What is the purpose of ergonomics in the workplace? A.Keep workers safe and injury free
    5·2 answers
  • In reduced visibility conditions you need to work especially hard to gather visual information because
    7·1 answer
  • Which of the following is a correct group scope type in AD, windows server 2016?
    6·1 answer
  • This is used to copy information from cell to cell in the spread sheet
    7·1 answer
  • Correct all the mistakes in the following sentence:
    15·2 answers
  • Write a function that will sum all of the numbers in a list, ignoring the non-numbers. The function should takes one parameter:
    8·1 answer
  • What are the three general methods for delivering content from a server to a client across a network
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!