1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlada-n [284]
4 years ago
6

Lisa wants to send an email with some confidential Information. Which of these options would work best for her?

Computers and Technology
1 answer:
Ugo [173]4 years ago
6 0

Answer:

A

Explanation:

I would choose A because that would be the best action to send the info. Bit make sure it's only sent to that one person. :)

You might be interested in
In every organization, workers receive and sendinformation daily. The flow of this information should be____________.upward and
Aleks [24]

Answer:

upward and downward

Explanation:

4 0
4 years ago
After calling the customer service line of Delta airlines, Francis received an email asking her to fill out customer satisfactio
Irina-Kira [14]

Answer:

Surveys

Explanation:

Quantitative research methods seek to generate useful data to properly analyze the behaviors, opinions, and attitudes of some selected individuals. The collection method of quantitative methods includes all forms of surveys (paper, online, mobile, etc.).

The customer satisfaction questions are a form of surveys because they seek to discover her perception, attitude, and behavior towards their company.

3 0
4 years ago
Using a Microsoft Windows system, open Internet Explorer. Click Internet Options on the Tools menu. Examine the contents of the
Novay_Z [31]

Answer:

You can restrict a user’s Internet Explorer web access by modifying the "Family" settings.

A) Content filtering tab in the Microsoft Windows Tab

From the left-hand navigation menu, select Settings > General > Advanced Features. Scroll down until you see the entry for Web content filtering. Switch the toggle to On and Save preferences.

B) to activate protection from unwanted items like cookies?

Open Internet Options | Privacy, click on the Advanced button. Place a check in "Override automatic cookie handling". Set "First Party Cookies" to Block, set "Third Party Cookies" to Block.

Cheers!

3 0
4 years ago
Why is it important to begin development of a software solution with a programming design in place?
Aloiza [94]

<u>Software solution with a programming design in place:</u>

Any software development designer plays important roles. Designer first understand software requirement and understand software architecture and deploying the environments. After designed understand he/she has to explain complete process requirement to developer or project manager or project leaders.

In case if the requirement of software designer fails to understand properly whole software development will goes wrong shape. So software design is key person and in later stage any modifications to software development he is responsible to give solutions.

So as conclusion software designer is key roles in software development.

5 0
3 years ago
A computer uses a memory unit with 256k words of 32 bits each. A bina.ry
iogann1982 [59]

Answer:

Touch and hold a clip to pin it. Unpinned clips will be deleted after 1 hour.

4 0
3 years ago
Other questions:
  • A _____ is a machine that changes information from one form into another.
    7·1 answer
  • It is illegal to have __________ emergency lights on your vehicle.
    6·2 answers
  • Which one of the following characteristics or skills of a ScrumMaster are closelyaligned with coaching?Select one:
    5·1 answer
  • A car has an odometer which at the start of a journey shows 99940 and at the end shows 00230.what is the result of subtracting 9
    11·1 answer
  • The basics of color theory assume what central tenets
    14·1 answer
  • I’m quitting this thing so I’m giving all my points away which are 218!!! I’m still gonna have more tho just in case I ever need
    15·2 answers
  • Lesson 12: while loops with the farmer. Number 9.
    10·2 answers
  • OMG 2 TIMES ;DDDDDDDDDDDDDDDDD​
    14·1 answer
  • _______ is a very common approach to multisystem authorization.
    5·1 answer
  • The local Driver's License Office has asked you to write
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!