1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vsevolod [243]
4 years ago
14

Kristine has been getting many unsolicited emails from a particular address. She thinks that these emails may harm her computer.

What action should she take to automatically send such emails to a separate folder?
Computers and Technology
2 answers:
vovikov84 [41]4 years ago
3 0
Kristine should mark the messages as spam.
Lena [83]4 years ago
3 0

Since Kristine has been getting many unwanted emails which she did not sign up for, she might have to mark all these emails’ senders as spam so that any new emails from these senders would immediately be sent to the Spam folder.

These emails can be harmless but annoying, but it can also create unknown adverse effects later on when the email is opened. Never open the links available in these type of emails because they will certainly create damage to your computer or information.

You might be interested in
The laser in a compact disc (cd) player uses light with a wavelength of 715 nm. what is the frequency of this light?
oee [108]
In order to get the frequency of this light you have to d<span>ivide the speed of light by the wavelength. 
The formula: </span>F = c / w<span>
Set the values in the appropriate form:</span>740nm = 7.40e-9m


Solution: 
3.00e8m/s : 7.40e-9m &#10;&#10;&#10;F = 6.38e16Hz
The answer:  = 63.8PHz
6 0
3 years ago
Go to the Subset tab, which gives a subset of randomly chosen data from the first tab. Go to your Math Tools and open the Graph
Karo-lina-s [1.5K]

A linear regression model is used to show the relationship between variables on a scatter plot

The equation of the linear regression model is: \^y = 1.56\^x + 1.29 and the correlation coefficient is 0.8034

<h3>How to determine the equation of the linear regression</h3>

The question is incomplete. So, I will make use of a dataset that has the following calculation summary (from a graphing calculator)

  • Sum of X = 45
  • Sum of Y = 83
  • Mean X = 4.5
  • Mean Y = 8.3
  • Sum of squares (SSX) = 82.5
  • Sum of products (SP) = 128.5
  • The value of R is 0.8034.

The equation of the linear regression model is:

\^y = 1.56\^x + 1.29

See attachment for the scatter plot

Read more about linear regression model at:

brainly.com/question/26347582

5 0
3 years ago
To back up your database, click the _____________to display Backstage view, click the Save &amp; Publish tab in the navigation b
Nuetrik [128]

Answer:

The answer is "File Tab".

Explanation:

In the database, restore is a database recovery process mechanism, that maintains administrative environment, configuration and stored software data. In the case of primary computer crashes, it helps to construct a new instance or to clone the database.

  • In this a file tab is an option, when we click on it is provides a backstage view of the file window, that deals with repositories and feature grades.
  • It helps you to do something in a database when you can make the situation within the database by putting commands on some other tabs on the Ribbon, that's why the file tab is the correct answer.
4 0
3 years ago
True or False: You cannot restore a deleted file on a volume protected by the Recycle Bin. Select one: a. False b. True
artcher [175]

Answer:

The answer is false

Explanation:

When you delete a file imagine you are erasing the path there. The file still will exist until it is wrote over. If you wish to retrive it many programs can do it for you.

5 0
4 years ago
__________ implements a security policy that specifies who or what may have access to each specific system resource and the type
malfutka [58]

Answer: Access control

Explanation:

Access control implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A typical example of this is in ERPs where access controls defines what access codes a process owner has and what access a reviewer and an approval has. Where a personnel has access to carry out a transaction, review and approve the transaction, access controls are said to be deficient.

The right answer is Access control

Hope this helps!!

6 0
3 years ago
Other questions:
  • When command is transferred, the process should include a(n): A. Detailed Lesson Learned Report B. Intelligence Report C. Award
    11·2 answers
  • We need ____ pointers to build a linked list.
    6·1 answer
  • Intellectual property piracy has gotten a small boost from the increasing availability of counterfeit goods through Internet cha
    14·1 answer
  • Your company leases a very fast internet connection and pays for it based on usage. You have been asked by the company president
    8·1 answer
  • Frank accidently overwrote his old document with a new document of the same name. He'd like to get his old document back. What f
    10·1 answer
  • Fill in the blank with the correct response. Wanting to become a better archer is a what?
    15·1 answer
  • Order the steps to add a recommended chart in excel.
    5·2 answers
  • Use the drop-down menus to match each description to its corresponding term.
    7·1 answer
  • Identify and state the value of hardware components​
    12·1 answer
  • Artificial intelligence (ai) in perspective is a complex and interdisciplinary field that involves several specialties, includin
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!