1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
2 years ago
12

Which Outlook view should Shane access to schedule a meeting with another individual inside his organization?

Computers and Technology
1 answer:
AnnyKZ [126]2 years ago
3 0

Answer: the answer is option D.

Explanation:

Firstly, Shane must choose the option "Calendar". In there, she will have to select the time in which she would like to schedule the meeting (by doing double click on the selected time slot).

Secondly, the "Appointment" window will open. In there, Shane will have to complete "Subject" (Rationale of the meeting - e.g. "Performance Review discussion"), "Location" (where would the meeting be held - e.g. Room 5.1, 5th floor), select start time and end time. Within the meeting body, she would be able to detail the high level agenda that the meeting will be carrying on.

Thridly, she will chose the icon "Invite Attendees" and will have to enter the contact's e-mail.

Finally, in order to make sure that the person is available for the selected time, it's always recommended to press the button "Schedulling Assistant" and review if the requested individual has his agenda clear (available) for the meeting.

You might be interested in
to protect a windows 10 system, you've configured system restore to automatically protect your system using restore points. will
zheka24 [161]

This can't adequately protect the user data on the system as one needs to enable file history.

<h3>How to depict the information?</h3>

In order to protect a windows 10 system, one will need to configure the system restore to automatically protect your system using restore points.

Despite this, this can't adequately protect the user data on the system as one needs to enable file history.

Learn more about windows on:

brainly.com/question/25243683

#SPJ12

8 0
2 years ago
Why are men more exposed to mass media?
adell [148]

Answer:

because they like exploring

8 0
2 years ago
Read 2 more answers
How does toothbrushes affect the world of technology?
Yuri [45]

Answer:

The invention of the toothbrush made a huge impact of society and people for many reasons. You should always brush your teeth and keep your mouth clean so you will have nice, white teeth, healthy gums, good breath, and just a clean mouth! Without the toothbrush, your mouth would be smelly, gross, and full of bacteria.Some of the different impact categories included acidification, climate change, eutrophication, human health, land use, resource use and water scarcity. The results concluded that the electric toothbrush had the greatest environmental impact in 15 out of the 16 categories with water scarcity being the exception.Using the electric toothbrush as an example, this article examines the growing acceptability of domestic health technologies that blur the traditional boundaries between health, aesthetics and consumption. By using empirical material from individual and household interviews about people's oral health practices, this research explores the relationships between an everyday artefact, its users and their environments. It investigates the ways in which oral health technologies do, or do not, become domesticated in the home environment. We conclude that the domestication of oral health technologies is not inevitable, with the electric toothbrush often becoming an ‘unstable object' in the domestic setting.

Explanation:

3 0
2 years ago
Read 2 more answers
An archive of files that usually contain scripts that install the software contents to the correct location on the system is ref
Anika [276]

Answer:

Option 3 is the correct answer for the above question.

Explanation:

  • A tarball is a software which is used to encrypt the other software or hide the other software and make it small. It again makes the original software program from the encrypted ones.
  • It is used to make the file sort and can use for the transfer which takes some amount of memory.
  • The above question asked about that technology which is used to make encrypted software from the original software and use it with the help of some script. Then the answer is tarball which is referred to from option 3. Hence Option 3 is the correct answer for the above question while the other is not because--
  • Option 1 states about the package manager which is used to manage the library only.
  • Option 2 states about the DBMS which is used to manage the database.
  • Option 4 states about the router which is used for the internet.

8 0
3 years ago
What operating system are you using? On most computers, you can answer this question by right-clicking on the "My Computer" icon
Viktor [21]

Explanation:

hbbbbhygjjjjkllkkjhkkky

5 0
2 years ago
Read 2 more answers
Other questions:
  • A self-confident person knows that:
    13·1 answer
  • Obtain a file name from the user, which will contain data pertaining to a 2D array Create a file for each of the following: aver
    5·1 answer
  • Every time you are asked to work with others, you are being asked to:
    6·2 answers
  • Without protocols the information sent and received through the Internet would never reach its intended target and even if it di
    6·1 answer
  • Lydia noticed that she feels tired and out of breath after walking her dog up a hill in the park. Which area of fitness does she
    8·1 answer
  • Which term describes the order of arrangement of files and folders on a computer
    11·1 answer
  • What is a screen tip
    6·1 answer
  • An example of creative curating is when a:
    9·1 answer
  • Please help
    11·1 answer
  • Javed’s teacher tells him she would like to see him improve his speaking skills in the next debate by including a rhetorical app
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!