1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet [91]
3 years ago
7

What is the default junk email protection in Outlook 2016?

Computers and Technology
2 answers:
Shtirlitz [24]3 years ago
4 0
The answer to ur question is D
erastovalidia [21]3 years ago
4 0
The answer to your question is going to be D
You might be interested in
A growling noise is heard only when the driver exerts force on the clutch pedal. No noise is heard when the clutch pedal is up.
Harrizon [31]

Answer:

answer a

Explanation:

the pilot bearing isnt moveing there fore makeing a nose

7 0
3 years ago
What are characteristics of the Advanced Calendar options in Outlook? Check all that apply.
anzhelika [568]

Answer:

Free/busy settings can be enabled.

One extra time zone can be created.

Display and theme settings can be changed.

Options are accessed through the Backstage view.

Explanation:

Just took it

7 0
3 years ago
Who was one of the founders of the location sharing site Foursquare​
Shalnov [3]

One of the founders of Foursquare is Dennis Crowley. The other is Naveen Selvadurai. I know you didn't ask for both but I wanted to give them to you just in case. I hope this helps! (:

7 0
3 years ago
General Hardware Products Your boss, the IT director, wants you to explain FDDs, BPM, DFDs, and UML to a group of company manage
Bas_tet [7]

Answer:

1. FDD is a process and Analysts can use a FDD to create and use business functions and processes. It Requirements models are used when gathering requirements for a new system.

2. BPM is used on an ongoing basis for business process improvement. It is meant to improve order, insight and efficiency of the collective workflows that make up any given business process. BPM is meant to reduce any chaos within those collective workflows that make up a process and eliminate ad hoc workflow management. BPM means Business Process Management.

3. DFDs stands for Data Flow Diagram which will help software developers and designers to understand how they can take their next step to fit into the overall business process. DFDs paly key role for a successful requirements modeling.

4. UML can be used for modeling a system independent of a platform language. UML is a graphical language for visualizing, specifying, constructing, and documenting information about software-intensive systems. UML gives a standard way to write a system model, covering conceptual ideas.

Explanation:

Functional decomposition diagram (FDD) is used to identify functions and define their structure. It is a technique to decompose the complex problem into manageable pieces or individual elements to develop the application or product.

DFDs: It contains a process (shape) that represents the system to model, in this case, the "Food Ordering System". It also shows the participants who will interact with the system, called the external entities. In this example, Supplier, Kitchen, Manager and Customer are the entities who will interact with the system.

Unified Modeling Language (UML): Edraw UML Diagram is the application of choice for many software engineers and designers. The software is fully compatible with 64 and 32-bit Windows platforms from Windows XP to Windows 10.

3 0
3 years ago
A dns query failure is referred to a higher level domain name server under what condition
zalisa [80]
Within the Flags detail is a flag titled recursion desired. This flag shows whether or not the local DNS should continue to query other DNSs if it is not able to resolve the current query. As DNS is local, it may or may not have the enough information to allow the address to be resolved. If the recursion flag is set, the local <span>DNS will continue to query higher level DNSs until it is able to resolve the address.  In short, t</span>he condition is when a flag is raised and it doesn’t have enough <span>information to allow the request.</span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • Consider this scenario: A major government agency experiences a data breach. As a result, more than 100,000 personal records are
    7·2 answers
  • Which loan type requires you to make loan payments while you’re attending school?
    10·1 answer
  • Shelly praised Susan via email for how well she executed an employee training program last week. Shelly is engaging in the _____
    6·1 answer
  • Using a loop, write a program that reads in exactly five integers and outputs the sum.
    11·1 answer
  • Whenever Jim starts his laptop, he sees some commands and numbers appearing on his screen. These instructions are being processe
    12·2 answers
  • You can use Facebook's Live Feed tool to broadcast content as you post it, true or false?
    11·1 answer
  • . Some countries lack physical resources, like computers or network connections, making it difficult to keep up with the technol
    8·2 answers
  • My phone takes forever to load the ads, does anyone else have this problem? Is there a way to fix it? I’ve tried getting another
    12·2 answers
  • Juhfvehrfwhedfhwkefhkujhiuyuiyuiyiyh
    6·1 answer
  • Running away from home
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!