1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RideAnS [48]
3 years ago
5

Tahir is setting up a message option before sending an e-mail to a colleague. He goes into the Properties dialog box and chooses

Private from a drop-down menu. Which message option is Tahir most likely setting up? Sensitivity Importance Delay Delivery Read Receipt
Computers and Technology
1 answer:
Fed [463]3 years ago
3 0

The answer is Sensitivity

Tahir can restrict actions a recipient can take on the messages he sends. It is recommended that you use IRM (Information Rights Management) if available. Choosing the private option will restrict the recipient from taking actions such as forwarding a confidential message to another person. When Tahir selects the private option, the recipient of the message will see a “please treat this as private” in the information bar.

You might be interested in
What happens as the key length increases in an encryption application?
pashok25 [27]
<span>The answer is : Increasing the key length of DES would  protect it against brute force attacks.  </span>Brute force is when the attacker tries every key knowing that one will eventually work.  <span>Key length increase proportionally increases the key space,  having a keyspace l</span>arge enough that it takes too much time and money to accomplish a brute force attack.
6 0
3 years ago
9.1.3: Printing vector elements with a for loop. Write a for loop to print all NUM_VALS elements of vector courseGrades, followi
svlad2 [7]

Answer:

The program to this question as follows:

Program:

#include <iostream> //defining header file

#include <vector> //defining header file

using namespace std;

int main() //defining main method

{

//defining integer variable NUM_VALS and i.    

int NUM_VALS = 4,i;//assign value in NUM_VALS variable

vector<int> courseGrades(NUM_VALS); //defining vector array

cout<<"Input values: "; //print message

for(i=0;i<NUM_VALS;i++) //loop for input value

{

//input value in verctor array    

cin>>courseGrades[i]; //input from user-end

}

for (i = 0; i < NUM_VALS; i++) //loop to print value

{

cout<<courseGrades[i]<< " ";//print value

}

cout << endl;//for new line

for (i = NUM_VALS-1;i >= 0;i--)//loop to print value in reverse order

{

//print value in reverse order

cout << courseGrades[i] << " "; //print value

}

cout << endl; //for new line

return 0;

}

Output:

Input values: 2

3

5

6

2 3 5 6  

6 5 3 2  

Explanation:

In the above-given code two integer variable "NUM_VALS and i" is declared, in which variable "NUM_VALS" assigns a value, that is 4, in the next step, a vector array "courseGrades" is defined, in which we take input from the user end.

  • In the next step two for loop is declared, in the first loop we simply print the value of the "courseGrades".
  • The second loop is also used to print the "courseGrades" value but, in the reverse order.
8 0
3 years ago
Which of the following is NOT an argument used to determine how a shot is fired from an A. object the shot itself being instanti
Firdavs [7]
C. The color of the shot...
7 0
3 years ago
In an experiment in which participants sat in an office and then were asked to remember what they saw in the office, participant
Inessa [10]

Answer:

The answer to this question is the "schemas".

Explanation:

A schema is plural schemata or schemas that defines a pattern of logic or action that constitutes classifications of data and the connections among them. In a computer science schemas is an organized structure for a database and all the operation of data modeling leads by schema. So the answer to this question is schemas

6 0
3 years ago
Dispositivo de computo
katrin2010 [14]

Answer:

wouf wouf wouf

Explanation:

i don't know.

8 0
3 years ago
Other questions:
  • Privileged instructions 1) generate an interrupt so they can execute before non-privileged instructions. 2) are valid only when
    5·1 answer
  • What is an advantage of sharing documents in PDF format instead of Word format?
    6·2 answers
  • How can you tell that a website is valid and reliable
    7·2 answers
  • What is meant by backing up files through cloud computing?
    5·2 answers
  • What is the output of the following function if the array nums contains the values 1 2 3 4 5 int backwards(int nums[]) { for (x
    15·1 answer
  • Which of the following extends a network over a large geographic area by connecting local area networks together?
    14·2 answers
  • Linda wants to apply for a job in a company of her choice. Which information would her potential employers likely review in her
    10·2 answers
  • Pls help I will give points
    7·1 answer
  • A program similar to mtr, ____, is available as a command-line utility in Windows operating systems.
    12·1 answer
  • A packet switch has 5 users, each offering packets at a rate of 10 packets per second. The average length of the packets is 1,02
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!