1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Likurg_2 [28]
3 years ago
14

A colleague has included you on an email that is irrelevant to you, but it continues to come to your inbox because people are us

ing the Reply All button when responding. You want some peace and quiet. What can you do to quiet message notifications coming in?
Computers and Technology
1 answer:
Law Incorporation [45]3 years ago
7 0

on google there is a mute function with the 3 dots on the top and outlook has it in the same location but under the word of "ignore"

You might be interested in
How does technology improve productivity at home? (Select all that apply.)
Aliun [14]

Answer:

B, C

Explanation:

?

5 0
3 years ago
1) Which forms are NOT appropriate to use for affirmations in Full Verbatim?
Oliga [24]

NOT appropriate to use for affirmations in Full Verbatim are :

d) Mm

e) Ammm

f) Aha

Explanation:

  • In verbatim transcription, interviews are transcribed word for word, and sound for sound.  Every um, uh, laugh, and sound must be recorded for posterity.

These are the preferred spellings of typical utterances:

  1. Affirmative: uh-huh, mm-hmm, yeah.
  2. Don't use: um-hum, um-hmm, uh-hum

  • Full verbatim refers to a transcript that includes absolutely everything that is said, exactly how the speakers say it. This means we include all ums, uhs, grammatical and vocabulary mistakes, false starts and repetitions - everything.
  • Verbatim is defined as an exact repetition without changing the words. An example of verbatim is when you quote someone exactly without changing anything.
3 0
3 years ago
You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directl
34kurt

Answer:

The answer is "Remote access "

Explanation:

The capacity to access another computer or network that you do not have. Remote computer access provides an employee with remote access to the desktop and file. This assists an employee, for example, who works at home efficiently.

Remote users access documents or other resources on any network-connected device or server, enhancing organizational efficiency and increase there are to cooperate more interact with peers nation.

6 0
3 years ago
How can getchar function be used to read multicharacter strings?​
alex41 [277]

69696969696969969696969696966969696969696V69696969696969969696969696966969696969696VVVV696969696969699696969696969669696969696966969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696V6969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696VVVV696969696969699696969696969669696969696966969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696V6969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696VVVV696969696969699696969696969669696969696966969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696V69696969696969969696969696966969696969696

5 0
3 years ago
Which is a solution that represents the majority of VPNs on the market and is commonly referred to as a VPN appliance?
Dafna1 [17]

Answer:

Remote access VPN

Explanation:

The solution that represents the majority of VPN's on the markets and is commonly referred to as a VPN appliance is the Remote access VPN

A remote access VPN is a type of VPN  that  works by creating a virtual channel (appliance ) between different devices for the purpose of exchanging data in an encrypted form. although this Tunnel passes through the public internet the Data exchanged are only accessible by the devices connected via the tunnel only .

The remote access VPN  is mostly used to connect an employee to the company's network therefore it represent the majority of VPNs in the market.

3 0
3 years ago
Other questions:
  • Question: Henry wants to change the configuration information of an application. Which file should Henry edit to change this inf
    15·1 answer
  • Dr. Joon asks her students how to insert a table in an Excel workbook. The students record the steps a chart. Which students lis
    15·1 answer
  • ASAP HELP NO GUESS A new pet store wants to design a logo to be displayed on business cards, posters in the shop’s windows, and
    9·2 answers
  • G=D+(A+C^2)*E/(D+B)^3 Rewrite the above formula in terms of doing concurrent processing using cobegin and coend to identify thos
    12·1 answer
  • Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond
    5·1 answer
  • Which os the following is NOT true about the proof of work concept?
    8·1 answer
  • Where does the CPU store its computations?
    14·1 answer
  • During a network infrastructure upgrade, you have replaced two 10 Mbps hubs with switches and upgraded from Category 3 UTP cable
    6·1 answer
  • The scientific process is most similar to what
    10·1 answer
  • Plsssssssss help me​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!