1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nookie1986 [14]
2 years ago
12

Janelle went to update the last name for one of her group contacts. She double-clicked on the contact, changed the last name, an

d closed the contact by clicking the red X in the top right corner. Which statement best explains why the contact did not update? Janelle should have right-clicked on the contact and clicked Modify. Contacts cannot be updated once they are saved as part of a group contact. Janelle should have clicked Save & Close to close the contact. Contacts can only be updated by re-entering all of the information for the contact.
Computers and Technology
2 answers:
Zina [86]2 years ago
8 0
Option 3) janelle should have clicked save and close to close the contact, hope this helps :)

Ivanshal [37]2 years ago
5 0
Janelle should have clicked Save & Close to close the contact.
You might be interested in
_________ is a society organized with the purpose of rendering service to its members and to the public in general.
sesenic [268]

Answer:

cooperate society

Explanation:

A cooperative society is a voluntary association that started with the aim of the service of its members.

8 0
2 years ago
Which 3 navigation features are missing in a reports only user view?
san4es73 [151]

Explanation:

when a user changes his or her view to a Report only view when using QuickBooks online they only see a report list page, without having such features as; Navigation panel, Search box or Quick Create (+) icon.

7 0
2 years ago
Read 2 more answers
What is software infrastructure?
Setler79 [48]
Software-defined infrastructure (SDI) is the definition of technical computing infrastructure entirely under the control of software with no operator or human intervention. It operates independent of any hardware-specific dependencies and are programmatically extensible.
4 0
3 years ago
In powerpoint a point is _____ of an inch in height.
USPshnik [31]
 a fraction

I think it is correct.

Hopefully it helps.
6 0
3 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Other questions:
  • Hilda is troubleshooting a problem with the encryption of data. at which layer of the osi reference model is she working?
    5·1 answer
  • GUI allows users to communicate with a device and see what they are doing onscreen.
    9·1 answer
  • How can you keep your files organized on your computer?
    13·2 answers
  • Write a paragraph expressing how you'd use the computer to enhance your place of work.​
    10·1 answer
  • What is online school like 3 sentences
    8·2 answers
  • What is the formula for determining the number of possible hosts on a network?
    5·1 answer
  • Before becoming romantically involved with a coworker you should
    7·2 answers
  • If you define a destructor, are you required to define an operator '=' and a copy constructor?
    9·1 answer
  • A _____ is a number that summarizes an encrypted information. digital certificate hash function message digest hash algorithm
    8·1 answer
  • Which components are involved with input? Output? Processing? Storage?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!