1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madreJ [45]
4 years ago
13

Nancy would like to configure an automatic response for all emails received while she is out of the office tomorrow, during busi

ness hours only. What should she do?
Configure an automatic reply.
Configure an automatic reply and select the Only send during this time range option.
Configure an automatic reply for both internal and external senders.
Configure an automatic reply rule.
Computers and Technology
2 answers:
marishachu [46]4 years ago
5 0

Answer:

I believe the answer is the second one

daser333 [38]4 years ago
5 0
It is the second one! because the other ones don’t provide an option to adjust the time
You might be interested in
given the numerical value 1010101.11, which of the following number systems is most likely represented.
nasty-shy [4]

Answer:

u have to give me more points

Explanation:

sorry

7 0
3 years ago
What is the main reason that IT managers believe the future IT career model will be diamond-shaped, with few entry-level IT jobs
Valentin [98]
<span>In which career field, would the Computing Technology Industry Association's CompTIA A+ certification be useful?</span>
4 0
3 years ago
To display “ hello ” message on the screen
Alex787 [66]

Answer:

hello like that

it's in order

4 0
3 years ago
(tco 8) when a file is opened in the append mode, the file pointer is positioned
Artyom0805 [142]
At the end of the file, so that additional data is appended while the existing data stays intact.
6 0
4 years ago
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most preci
Slav-nsk [51]
The containment strategy prevents intruders from removing information assets from the network, and prevents attackers from using the organization's network as a launch point for subsequent attacks.
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most precise strategy possible, starting with <span>blocking a specific IP address. Correct answer: C

</span>

8 0
3 years ago
Other questions:
  • On the Insert tab, select Table &gt; _______ to create a table from selected text.
    14·1 answer
  • Which of the following attributes of a website indicates a more reliable source for information?
    8·1 answer
  • Drag each label to the correct image.
    9·2 answers
  • what is the total resistance of a series circuit with four resistors in series of 12 16 20 and 24 ohms​
    14·1 answer
  • When you are working in Performance Monitor, in the "Add Counters" dialog box, and need more information about a particular coun
    8·1 answer
  • Ken is a mobile app developer. He is designing a mobile app that offers tips and guidance to people interested in learning jazz
    8·2 answers
  • Which file is usually the first file to be displayed when you navigate to a website?
    5·1 answer
  • When planning your App what difficulties did come across and why?
    5·2 answers
  • List any three positive impact of a computer​
    9·1 answer
  • You have two identical print devices that are set up in a work room. Currently, the Windows print server has two printers config
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!