1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
densk [106]
4 years ago
6

Brenda keeps forgetting what she needs to do throughout the day, misses meetings, and doesn't meet her due dates for submitting

reports.
Which email action can help Brenda become more efficient at worke
A
deleting junk emails frequently
B. checking the calendar often in Inbox
c moving junk emails to Spam
D. maintaining a task list
Computers and Technology
1 answer:
Lerok [7]4 years ago
5 0

Answer:

D. maintaing a task list

Explanation:

if Brenda makes a task list she can see what all she needs to do everday.

You might be interested in
Please please help I don’t understand this
garik1379 [7]

Answer:

It is this because yass

Explanation:

And yes

6 0
3 years ago
Read 2 more answers
clinical outcomes and survival differences between primary, secondary and concomitants carcinoma in situ of urinary bladder trea
8_murik_8 [283]

The summary of the research - clinical outcomes and survival differences between primary, secondary and concomitants carcinoma in situ of urinary bladder treated with BCG Immunotherapy is given below.

<h3>What is the summary of the above research?</h3>

Urinary bladder carcinoma in situ (CIS) is a flat, high-grade, and aggressive form of urothelial cancer with a high likelihood of development to muscle-invasive illness and metastatic dissemination.

The study's goal was to compare the clinical histories and survival rates of primary, secondary, and concurrent CIS of the bladder.

Learn more about Immunotherapy at brainly.com/question/14493516

#SPJ1

6 0
1 year ago
Read 2 more answers
When a program lets the user know that an invalid menu choice has been made, this is an example of?
kolezko [41]

The question has the multiple choices below

A) Input validation
B) output correction
C) compiler criticism
D) output validation

The answer is (A) Input validation

Also known as data validation, it is the correct and proper testing of any input supplied by an application or a user. It prevents wrongly formed data from entering the system. Applications should be able to check and validate every input entered into the system since it is hard to detect a malicious user trying to gain entry into software.










5 0
3 years ago
Explain the five generations of computer
liubo4ka [24]

Answer:

1 First Generation

The period of first generation: 1946-1959. Vacuum tube based.

2 Second Generation

The period of second generation: 1959-1965. Transistor based.

3 Third Generation

The period of third generation: 1965-1971. Integrated Circuit based.

4 Fourth Generation

The period of fourth generation: 1971-1980. VLSI microprocessor based.

5 Fifth Generation

The period of fifth generation: 1980-onwards. ULSI microprocessor based.

5 0
3 years ago
Read 2 more answers
What should you do first when designing a program?
Nady [450]

Answer: talk about da progrm

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • A network in which communication passes from one person to another in a sequential pattern rather than being shared among member
    6·2 answers
  • You have connected thirteen pcs and laptops to a wireless network. to make your wlan more secure, what should you do to disallow
    11·1 answer
  • Why did the Wright brothers construct their own wind tunnel?
    11·1 answer
  • The text discusses three different steps when processing input. Which of the following is (are) one of those steps? (Check all t
    8·1 answer
  • The Python MySQL Connector library:
    15·1 answer
  • If the ____________ is broken on a laptop, chances are other parts are also broken.
    12·1 answer
  • What is the main advantage of using DHCP? A. Allows you to manually set IP addresses B. Allows usage of static IP addresses C. L
    8·1 answer
  • Bob gets an e-mail addressed from his bank, asking for his user ID and password. He then notices that the e-mail has poor gramma
    6·1 answer
  • What is one thing we should avoid doing when summarizing a storyline or event in a review?
    10·1 answer
  • In your own view, how can social media be used in teaching and learning in higher education?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!