1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodka [1.7K]
3 years ago
13

When you want to avoid sending email that a recipient may feel their privacy has been invaded, how would you fill in the (To) bo

x?
Computers and Technology
1 answer:
timama [110]3 years ago
6 0
Fill out the name or business address of the place they work or if they do not have a business email send it to a friend
You might be interested in
PLS HELP ;CC
icang [17]

Answer:

a

early photographers who were first painters

Explanation:

The Rule of Thirds is a compositional technique which states that image painting, photograph, graphic design should be divided into nine equally proportioned boxes by creating a grid with two vertical and two horizontal lines. The rule of third helps in making the picture more attractive and balanced

The rule of thirds was first used in landscape paintings by painters as early as 1797.

5 0
3 years ago
Why computer is known as versatile and diligent device ?explain​
pashok25 [27]

They are versatile because they can be used for all sorts of tasks. They can also do many of the same tasks in different ways. They are diligent because they will do a task thoroughly until it is finished.

They work at a constant speed to do the task. Unlike a human, they will not slow down or get bored or start making mistakes that they were not doing earlier. So once they are programmed correctly to do a task, they will do it diligently.

6 0
3 years ago
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
3 years ago
0 50 100 150 200 250 300 350 400 Shape Size These shapes are the correct 50 01 100 150 Pattern Reference If you don't have red,
cricket20 [7]

Answer:

0 540 100 200 350 400 550 600 750

Explanation:

hope this helped

4 0
3 years ago
Read 2 more answers
Describe it the impact of computer in office?​
krok68 [10]

Answer:

Computers in the office environment significantly enhance productivity. According to the Reference for Business Web site, computers in the office increase productivity not only in areas such as word processing, data management and information access, but also in information creation, collation and ultimately storage. The amount of time most office workers spend at the computer has, however, given rise to a number of repetitive strain health problems on eyes, wrists and hands

hope it helps (^^)

# Cary on learning

7 0
2 years ago
Other questions:
  • Write a program that estimates the approximate number of times the user’s heart has beat in his/her lifetime using an average he
    12·1 answer
  • Which are factors that go into a project plan? choose four answers
    14·1 answer
  • Is anyone really good at immerse 2 learn??
    9·1 answer
  • Why do you think that so many of these sources have similar names?
    9·1 answer
  • Which of these is NOT a mathematical operator used in Python?
    12·1 answer
  • Can someone tell me how to get rid of the the orange with blue and orange on the status bar
    14·2 answers
  • How to do GCD on small basic?​
    7·1 answer
  • Draw
    7·1 answer
  • Is orgenized maningful and useful data​
    15·1 answer
  • Is iphone battery being draned if plugged into car charger when listening to podcasts
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!