1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RideAnS [48]
4 years ago
5

Tahir is setting up a message option before sending an e-mail to a colleague. He goes into the Properties dialog box and chooses

Private from a drop-down menu. Which message option is Tahir most likely setting up? Sensitivity Importance Delay Delivery Read Receipt
Computers and Technology
1 answer:
Fed [463]4 years ago
3 0

The answer is Sensitivity

Tahir can restrict actions a recipient can take on the messages he sends. It is recommended that you use IRM (Information Rights Management) if available. Choosing the private option will restrict the recipient from taking actions such as forwarding a confidential message to another person. When Tahir selects the private option, the recipient of the message will see a “please treat this as private” in the information bar.

You might be interested in
5. Why would you want to wear white or light colors on a summer day?
vfiekz [6]

A. White absorbs all light and reflects none so it is cooler.

3 0
4 years ago
What does a for loop look for in the sequence of data? Check all that apply.
ValentinkaMS [17]

Answer:

All

Explanation:

Not sure on the context of this question, but a loop is generally used to iterate though every piece of data to perform some kind of operation, on everything in something like an array or string.

7 0
3 years ago
Read 2 more answers
You are a trainer for your company and often teach courses in a classroom located on-campus or in a hotel conference room. In yo
Alisiya [41]

Answer:

Duplicate these displays.

Explanation:

<u>A. Show only on 1</u> <em>displays only the first screen and disconnects the second one</em>

<u>B. Extend these displays</u> <em>displays two different outputs on the same computer</em>

<u>C. Show only on 2.</u> <em>displays only the second screen and disconnects the first one</em>

<u>D. Duplicate these displays.</u> <em>displays the same output for both screen</em>

5 0
3 years ago
Read 2 more answers
What is the worst case time complexity of insertion sort where position of the data to be inserted is calculated using binary se
laiz [17]

Answer:

O(n²)

Explanation:

The worse case time complexity of insertion sort using binary search for positioning of data would be O(n²).

This is due to the fact that there are quite a number of series of swapping operations that are needed to handle each insertion.

4 0
3 years ago
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
4 years ago
Other questions:
  • What are 2 ways that technology can negatively impact the environment.
    8·2 answers
  • How can you autohide the taskbar in Windows 10?
    8·2 answers
  • You view a portion of a document on the screen through a
    14·1 answer
  • A) Suppose a computer has an instruction pipeline with 4 phases. How many cycles (if there are no delays) would it take to compl
    13·1 answer
  • What are Manuscript signs​
    8·1 answer
  • Modify the program you wrote for Chapter 6 Exercise 6 so it handles the following
    15·1 answer
  • Another way to create a new presentation is from the Home tab
    6·2 answers
  • Explain why this scenario could put an organization in jeopardy of losing some of its workforce.
    12·1 answer
  • Consider the following method, which is intended to count the number of times the letter "A" appears in the string str.
    13·1 answer
  • What does an arrow after a command indicate
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!