1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olegator [25]
3 years ago
7

On Gmail, can I have an email get sent to someone at a certain time?

Computers and Technology
1 answer:
amm18123 years ago
7 0
Not unless you do so manually. I'm not positive but 85% positive you have to send in manually.<span />
You might be interested in
When creating a multi-dimensional array dynamically in C/C++ the Memory Manager will go to great pains to make sure the array is
yuradex [85]

Answer:

Here the statement is false.  

Explanation:

In C/C++, we can define multidimensional arrays in simple words as an array of arrays. Data in multidimensional arrays are stored in tabular form (in row-major order).  

General form of declaring N-dimensional arrays:  

data_type  array_name[size1][size2]....[sizeN];  

data_type: Type of data to be stored in the array.  

          Here data_type is valid C/C++ data type

array_name: Name of the array

size1, size2,... ,sizeN: Sizes of the dimensions.

Foe example:

Two dimensional array:

int two_d[10][20];  

Three dimensional array:

int three_d[10][20][30];

8 0
3 years ago
HELPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP!!!
Bingel [31]

Answer:

different or difference between Dot-matrix and Daisy-wheel printer

3 0
3 years ago
If you're driving a car and know there's a motorcyclist around you, you should______. A. Not change your driving B. Check your b
Sedaia [141]

b check your blind spots frequently i guess not sure

5 0
3 years ago
Consider the following four 2-dimensional data points: (2, 2), (4, 4), (1, 5) and (5, 1). We can make use of the KL-Transform to
trasher [3.6K]

Answer:

pootis

Explanation:

4 0
3 years ago
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
Other questions:
  • Jeremy Bridges is an executive for Green Web Designs, where his primary role is to ensure the security of business systems and d
    6·1 answer
  • What is computer virus?
    8·1 answer
  • This is going to get taken down but I dont care add me on discord cause ima bored<br> -Red-#9847
    12·1 answer
  • Laura is confused with the spelling of the word pronunciation. She types the word pronunciation. Which feature of the auto corre
    8·2 answers
  • Which one of the following items is an example of software?
    15·1 answer
  • Belvedere Street is parallel to St. Anthony Street. Davidson Street is perpendicular to River Street. River Street is parallel t
    11·1 answer
  • Use of multimedia in business sector...​?
    5·1 answer
  • One of the most common uses of spreadsheet are
    12·1 answer
  • Pls explain the meaning of the word"INTERNET"​
    5·2 answers
  • Because all the IEEE WLAN features are isolated in the PHY and ____________ layers, practically any LAN application will run on
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!