1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vfiekz [6]
4 years ago
7

Which is the order of steps for attaching an item to a contact?

Computers and Technology
2 answers:
juin [17]4 years ago
8 0

select the contact's Files page, then press the + button to bring up the file selection window. You can select multiple files and press the Import button

select the contact's Files page, then drag-and-drop files into the files section from Finder. You can also drag-and-drop emails from the Mail app  

select the main Files section from the app's left sidebar, then select the + button; you will have to first select the contact, then select the files you want to import in the files selection window

select the main Files section from the app's left sidebar, then drag-and-drop files into any existing contact's files section. You can drag-and-drop files from Finder, or emails from the Mail app.  

with the Files section selected from the app's left sidebar, you can drag-and-drop files and emails onto the "Files" button, and then select a contact that isn't  visible or doesn't have an existing section in the Files page.  

with either a contact's Files section selected, or the general all Files page selected, you can paste a file from the clipboard into Contacts Journal. You will be asked to select a contact

aivan3 [116]4 years ago
5 0
We need to know what item and then we can answer ur question
You might be interested in
Pls answer i will give 20 points
Misha Larkins [42]

Answer:

Penicilium roqueforti

4 0
2 years ago
Task 5: Create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer whose ID currently is sto
lidiya [134]

The SQL statement that would create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer is:

GET_CREDIT_LIMIT

SELECT CUST_ID 125

FROM FIRST_NAME, LAST_NAME, CREDIT_LIMIT

WHERE LAST_NAME ="Smith"

<h3>What is SQL?</h3>

This is an acronym that means Structured Query Language that is used in handling data in a database.

Hence, we can see that from the attached image, there is a table that contains the details of customers and their various data such as their first and last names, credit limits, address, etc, and the  GET_CREDIT_LIMIT procedure is shown above.

Read more about SQL here:

brainly.com/question/25694408

#SPJ1

3 0
2 years ago
Please Help ASAP!!
Maurinko [17]

Answer:

in the page layout view

Explanation:

7 0
3 years ago
Read 2 more answers
Are sql injections legal?
natima [27]

Essentially, if you are seen to be someone who knows what you are doing, then even typing in a single-quote to a web form has been enough to be arrested and charged over in the past.

But lets say i'm writing a pen test tool that will be doing sqli testing and let it loose on sites that are 'out in the wild'. I'm not going to be doing dumps of any information. But is just the vulnerability scan itself illegal?



8 0
4 years ago
Discuss your role as an IT professional in terms of your responsibility to clients, co-workers and society.
Tom [10]

An IT professional is expected to deliver correct installations and programming that are safe from security breaches to clients. To co-workers, teamwork, respect, and brainstorming are needed to work together and achieve results. To society, an IT professional is expected to deliver architectures that do not compromise security and privacy.

An information technology professional could be focused on the hardware or software of systems. It is vital that IT professionals deliver services that are foolproof and not susceptible to attacks.

When working with colleagues, they must cooperate in order to deliver the most efficient services.

Learn more about IT professionals here:

brainly.com/question/14314381

8 0
2 years ago
Other questions:
  • A ____ document identifies the purpose of the program being developed, the application title, the procedures to be followed when
    11·1 answer
  • What were precomputed tables and why were they necessary?​
    12·2 answers
  • If you press the key corresponding to letter A on the keyboard, what process is carried out inside the CPU to display the letter
    10·1 answer
  • You want to boot a linux system into singer user mode/ what options might you add to a linux kernel options list in a boot loade
    9·1 answer
  • Having friends who cause you stress can decrease your happiness, which can in turn
    13·2 answers
  • Select the correct word to complete the sentence
    11·2 answers
  • Given positive integer n, write a for loop that outputs the even numbers from n down to 0. If n is odd, start with the next lowe
    8·1 answer
  • 1.<br>is the office industry leader at the moment.​
    9·1 answer
  • Please answer this question​
    8·1 answer
  • what uses gps tracking to track vehicles? group of answer choices edge matching. cartography. automatic vehicle location. geogra
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!