1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
densk [106]
3 years ago
6

Brenda keeps forgetting what she needs to do throughout the day, misses meetings, and doesn't meet her due dates for submitting

reports.
Which email action can help Brenda become more efficient at worke
A
deleting junk emails frequently
B. checking the calendar often in Inbox
c moving junk emails to Spam
D. maintaining a task list
Computers and Technology
1 answer:
Lerok [7]3 years ago
5 0

Answer:

D. maintaing a task list

Explanation:

if Brenda makes a task list she can see what all she needs to do everday.

You might be interested in
A website for a certain political party or candidate is likely to have unbiased
bagirrra123 [75]
False I believe probably false
4 0
3 years ago
Solve the following equations and check your result 1) 3x=2x+18​
Tamiku [17]

Answer:

x = 18

Explanation:

3x = 2x+18

3x-2x = 18

x=18

5 0
3 years ago
Read 2 more answers
Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
Andrew [12]

<u>Man-in-the-middle attack</u> refers to a type of an attack in which an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers.

<u>Explanation:</u>

A man-in-the-middle attack (MITM) is an assault where the aggressor furtively transfers and potentially changes the correspondences between two gatherings who accept that they are straightforwardly speaking with one another. This happens when the assailant catches a segment of a correspondence between two gatherings and retransmits it sometime in the future. The assailant would then be able to screen and perhaps change the substance of messages. The utilization of such encoded burrows makes extra secure layers when you get to your organization's secret systems over connections like Wi-Fi.

8 0
3 years ago
In a word processor, Tariq chooses Options from the Tools menu and then selects the Track Changes tab. Which of the following ta
bearhunter [10]

Highlight Changes

Compare Documents

3 0
4 years ago
Do earthquakes ever happen in Malaysia?​
adoni [48]

The correct answer to this open question is the following.

Although there are no options attached we can say the following.

Do earthquakes ever happen in Malaysia?

Yes, they do. And they are very frequent and high in intensity.

For instance, the Sabah earthquake in 2015.

On June 5, 2015, the region of Malaysia was hit by a strong earthquake, 6.0 of magnitude on the Ritcher scale. The telluric movement lasted 30 seconds and caused much destruction.

Experts and scientists confirm that this had been the strongest earthquake since the one presented in 1976.

8 0
3 years ago
Other questions:
  • True or false?
    5·1 answer
  • What is the purpose of a turbine in a power plant?
    14·1 answer
  • Proper numeric keyboarding technique includes:
    15·1 answer
  • A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered f
    9·1 answer
  • 1) Why is angle of view important? What are some of the ways that you can do this?
    6·1 answer
  • A provides legal protection for something an individual has created
    12·1 answer
  • When a person or organization uses the services of another professional, that person or organization is called the _______
    15·1 answer
  • Security administrator for your organization utilized a heuristic system to detect an anomaly in a desktop computer's baseline.
    7·1 answer
  • Retype and run, note incorrect behavior. Then fix errors in the code, which should print num_stars asterisks.
    9·1 answer
  • . Write a C++ Code to get a multiline statement Str1 from a user with a ‘$’ as return character (Hint:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!