1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
poizon [28]
3 years ago
12

Diane is receiving a lot of unwanted e-mail. What steps can she take to reduce the amount of e-mail she receives?

Computers and Technology
1 answer:
Over [174]3 years ago
5 0
She maybe needs to block or unsubscribe to the site where the E-Mail is sent from
You might be interested in
Backordered Parts is a defense contractor that builds communications parts for the military. The employees use mostly Web-based
Nikolay [14]

Answer:

Secure Sockets Layer (SSL)            

Explanation:

  • SSL is a  standard security technology for setting up an encrypted link between a server and a client (in this case web browsers and web server).
  • SSL is a security protocol that transmits sensitive information securely.
  • As we know data transmitted between browsers and web servers is sent in the form of plain text.
  • If a hacker is able to seize data being transmitted between a browser and a web server, they can misuse that information.  
  • So SSL makes the web servers and web browsers to communicate with each other securely.
  • When transmitting confidential information, a web server and browser set up a secure connection using SSL certificate.
  • The link between web server and browser is encrypted by SSL which makes sure that all data transmitted between them remains private and protected.
  • Due to the sensitive nature of the business SSL is most suitable solution to keep sensitive information sent across internet encrypted making sure that only intended receiver can access it.
  • SSL certificate is used for authentication purpose.
  • For making sure that information is sent to right server, web browsers give indication of secured connection via a lock icon attached or uses https.
5 0
3 years ago
How do I attach a file on the computer?
strojnjashka [21]
When you select 'ask your question' a box will appear and it will ask you to write your question. Underneath the text box you'll see a 'pi' sign and an 'omega' sign and next to that you'll see a paperclip sign. Click the paperclip sign and then choose the file/s you want to attach.

I have attached a docx (document) if you don't get what i mean.
Hope it helped :)
Download docx
4 0
3 years ago
A slideshow that accompanies an oral report is known as what?
pychu [463]
Presentation :)))))))))))))
5 0
4 years ago
When issued a GFE device, you are required to sign an AUP
pav-90 [236]
GFE stands for Government Furnished Equipment. While AUP is Acceptable Use Policy (AUP). The AUP  should be read and signed by employees annually.  <span><span> </span></span>The statement that "When issued a GFE device, you are required to sign an AUP" is true. 
7 0
3 years ago
Read 2 more answers
Item 3Item 3 John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastruc
White raven [17]

Answer:

Replacing computer parts.

Explanation:

John replaces faulty computer parts, such as DVDs, hard drives, ram cards, wires etc. John can also replace the whole motherboard or clean it (for dust).

Computer parts not functioning properly or dying is a common problem in computer systems. Motherboard, the circuit that holds all the components of a computer, like CPU, Ram and Hard disk, can also fail or die.

5 0
3 years ago
Other questions:
  • Which of the following best describes the purpose of child labor laws?
    13·2 answers
  • Fractures in Earth’s crust where displacement has occurred are called
    13·1 answer
  • True or false. Every word has only one correct spelling and pronunciation.
    6·1 answer
  • Osha requires employers pay for most required personal protective equipment including
    11·1 answer
  • ______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
    12·2 answers
  • What's a checked exception?
    14·2 answers
  • NEED ANSWERS ASAP
    6·2 answers
  • What triggers a LinkedIn account ban?
    6·1 answer
  • B. Directions: Fill in the blanks with the correct answer.
    13·1 answer
  • Testing components for satellites is a classic example of
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!