1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nonamiya [84]
3 years ago
14

Which are options for levels of junk e-mail protection in outlook 2010? Check all that apply.

Computers and Technology
2 answers:
Alexus [3.1K]3 years ago
6 0
Im pretty sure it  
<span>No automatic filtering
Partial automatic filtering
</span><span>Safe lists only
</span><span>High

</span>
monitta3 years ago
6 0

100% sure its:

low

high

safe lists only

no automatic filtering


You might be interested in
When is a wired connection preferred to a wireless connection by an end-user device?
harkovskaia [24]

Answer:

Option (b) When the end-user device will run an application that requires a dedicated connection to the network

Explanation:

  • Option (b) is the correct option.
  • When the user device requires a highly dedicated network environment to itself to run a web application that requires large download and upload speeds, bandwidth requirements then it prefers a wired connection than a wireless connection.
  • If the wireless signal is within the reach, then it advisable to go for a wireless connection than a wired connection. A wired connection requires other hardware equipments like a internet connection cable etc. which is not required in case of wireless connection. So, option (a) is wrong option.
  • WLAN NIC is a wireless interface network controller that connects to a wireless radio based network than a wired network.So, option (c) is wrong option.
  • Delay torrent network is designed to operate where continuous network connectivity is not available like extreme terrestrial spaces, space communications, inter planetary communications etc.So, option (d) is wrong option.
6 0
3 years ago
uppose you are going on a road trip with friends. Unfortunately, your headlights are broken, so you can only drive in the daytim
tiny-mole [99]

Answer:

Explanation:

Algorithm:

a. In each day, you will have to loop through the hotels that come to the hotel after you stayed last night.

b. If a hotel 'h' is found at more than 'd' distance away from last stayed hotel, then the hotel previous of 'h' is chosen to wait for that night. This is the greedy step, and you stay in this hotel.

c. The process for steps a and b is then repeated until we've reached the last hotel xn.

Running time:

Notice that the worst case occurs if each hotel is at a distance of successive multiples of 'd'. The best move is to estimate the distance to each hotel twice the whole computation in the scenario.

Thus, the total running time that could occur in the worst case is O(2n) = O(n). This is said to be linear time.

6 0
3 years ago
__________ is a software-enabled technique that can change the hardcoded mac address to any mac address and thus overcome mac ad
lukranit [14]

MAC address spoofing is a software-enabled technique that can change the hardcoded mac address to any mac address and thus overcome mac address filtering.

<h3>What is MAC spoofing?</h3>

It should be noted that MAC spoofing simply means a technique for changing the factory assigned media access control to a network interface.

In this case, it is a a software-enabled technique that can change the hardcoded mac address to any mac address and thus overcome mac address filtering.

Learn more about spoofing on:

brainly.com/question/15179149

#SPJ12

6 0
2 years ago
Does chell in portal SAY a single word
musickatia [10]

Answer:No

Explanation:Chel was supposed to say hi at the end of portal 2 but didn’t cuz of portal jumping

5 0
3 years ago
2. Find the largest number that can be written in binary using 13 binary digits.
bija089 [108]

Answer:

9999999999999

Explanation:

does this help

6 0
2 years ago
Other questions:
  • Suppose we wish to put a set of names in alphabetical order. We call the act of doing so sorting. One algorithm that can accompl
    15·1 answer
  • Explain the concept of risk management, including risk identification, assessment, and control.
    5·1 answer
  • Is a plotter input output or both
    10·1 answer
  • What is the statement describing? Agile team continuously adapt to new circumstances and enhance the methods of value delivery
    6·1 answer
  • (1) Prompt the user for a string that contains two strings separated by a comma. (1 pt) Examples of strings that can be accepted
    13·1 answer
  • a_____________ may have its value change during program execution. options. flowchart,counter, Algorithm,None of them​
    15·1 answer
  • You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy o
    6·1 answer
  • List the three control problems associated with competingprocesses and briefly define each.
    7·1 answer
  • What is a computer class from 8​
    12·1 answer
  • En una Memoria SD de 128 Gb, ¿Cuántas fotos en alta resolución de 16 Mb puedo almacenar?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!