1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
3 years ago
14

If you delete a sent message on gmail does the person still get it

Computers and Technology
1 answer:
dedylja [7]3 years ago
5 0
Yes, the person still gets the email. Unless you hit ‘undo’ after you hit ‘send’.
You might be interested in
What specific parameter will allow you to base a recursion policy on the subnet address of the clients?
Nookie1986 [14]

Answer:

Client subnet

Explanation:

Client subnet is a mechanism for recursive resolvers that helps to send partial client IP address information to authoritative DNS name servers. It is a group of IP subnets and it is identified by a name.

It is with the aid of client subnet that you base recursion policy on the subnet address of the clients.

6 0
3 years ago
Read 2 more answers
Jahmar typed 350 words in 25 minutes. What is his typing speed?
loris [4]

Answer:

its 14

Explanation:

350/25 is 14 words per minute

4 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
xz_007 [3.2K]
Set a reminder was writing down all the list of all criminals that she would require for recording her composition of the top of the list she wrote
4 0
3 years ago
If my beats by Dre are lighter does that mean they are fake because they feel really light. I have the Solo 3 wireless
lubasha [3.4K]

Answer:

yess

Explanation:

4 0
3 years ago
. assures that individuals control or influence what information related to them may be collected and stored and by whom and to
rewona [7]

Answer: Privacy  

Explanation: Privacy is defined as information or content that is kept to the selected or desired resources and people.It is like a boundary after which the information should not be shared or disclosed because of the privates reasons such as insecurity , protection etc.It is followed for confidential and sensitive content to remain secure and cannot be misused.

Other options are incorrect because availability is referred serviceability of data, system integrity is assuring no unauthorized action in system for modification and data integrity assures about the safeness and reality of information without manipulation .Thus, the correct option is privacy.

7 0
3 years ago
Other questions:
  • Bioengineering can be defined as biological or medical application of engineering principles or engineering
    15·1 answer
  • Given two int variables, i and j, which have been declared and initialized, and two other int variables, itemp and jtemp, which
    14·1 answer
  • Which of the following allows you to view and access important information about your document all in one location?
    11·2 answers
  • ____ is an object-oriented programming language from Sun Microsystems which allows small programs called applets to be embedded
    13·1 answer
  • The best defenses against covert channels include IDS and intrusion prevention system (IPS) and thoroughly watching all aspects
    15·1 answer
  • What statement best describes operating systems?
    15·2 answers
  • Write a program that get
    9·1 answer
  • During this project, you will prepare a short business report. You will accomplish the following during this section of the proj
    7·1 answer
  • 3- It is an Information page that is displayed through one of the Internet browsers, it can be saved along htm, html page.
    11·2 answers
  • If the bookstore sold 8 books for $66 at that rate how much was one book
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!