1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vika [28.1K]
4 years ago
14

Which option in Outlook allows a user to look at multiple calendars in a side-by-side fashion?

Computers and Technology
2 answers:
Thepotemich [5.8K]4 years ago
8 0

Answer:

Its A

Explanation:

I just took the review

olya-2409 [2.1K]4 years ago
7 0

Answer: a

Explanation: its a on edge

You might be interested in
Your employer is opening a new location, and the IT director has assigned you the task of calculating the subnet numbers for the
astraxan [27]

Answer:

Check the explanation

Explanation:

• We are taking a look at the class B network beginning with 172.0.0.0.0,while Converting this value to binary as:10101100.00010100.00000000.00000000.  32 bits in total, out of this the First 16 bits that are used as network ID and the subsequent 16 bits are used as HostID.Out of the 16 bits that are sued for Network ID the 2 bits namely Bits fifteen and sixteen (15 and 16) have been set and can't be changed and hence only 14 bits are used as network ID.

• Now so that we can divide this network into 50 subnets for class B network we will have to borrow a bit as shown below:

• 10101100.00010100.00000000.00000000=172.0.0.0.0,Adding 1 bit by borrowing from host portion and adding it to network ID will give it 10101100.00010100.00000000.00000000(0 shown in bold) or10101100.00010100.10000000.00000000 (1 shown in bold) will give us 2 unique subnets.i.e changing 1 bit will give us 2 power 1=2 subnets,thus changing 2 bits will give us 2 power 2 subnets =4 similarly changing 6 bits will give us 64 unique subnets.

• Which means and going by the above problem statement in case we need 50 subnets and we also need to change 6 bits in the Network ID to give 50 unique subnets.

• Thus the answer is 6

3 0
4 years ago
PLEASE SOMEONE ANSWER THIS
GuDViN [60]

Answer:

Any of these?

Explanation:

1147. 4117. 7411

1471. 4171

1714. 4711

1741. 7114

1417. 7141

5 0
3 years ago
Read 2 more answers
Identify two different uses/applications of data in which biases in word embeddings might cause significant ethical harms, then
olchik [2.2K]

The two different uses or applications of data that is biases in word embeddings and may cause significant ethical harms are:

  • Class immobility
  • Systemic racism

<h3>What are the biases in word embedding?</h3>

Word embeddings is known to be made up of a high level bias such as group stereotypes and prejudice.

The two different uses or applications of data that is biases in word embeddings and may cause significant ethical harms are:

Class immobility
  • Systemic racism

Learn more about biases from

brainly.com/question/24491228

#SPJ1

4 0
3 years ago
How can u get this off us keybored chromme book
WITCHER [35]
Click the icon at the bottom of the screen that says “US” it should go away
5 0
4 years ago
What does anyone who chooses to use speech recognition software need to do?
skelet666 [1.2K]
D I believe. I’m not %100 percent sure.
4 0
3 years ago
Other questions:
  • Sukant’s professor asks her to take over his online class while he is away because she is an effective digital communicator. Whi
    11·2 answers
  • witch option in a presentation program contains the formatting and placeholders for all the items that appear on a slide?
    11·2 answers
  • Ally is taking a photograph of her friend. What is the orientation of her phone's screen?
    6·1 answer
  • The effects of activating the complement system include all of the following except
    14·1 answer
  • A simulation system is a technology that enables you to take over a customer’s screen, mouse, or other connected device in order
    13·1 answer
  • What is MS Paint ?<br>Computer <br>short answer​
    14·2 answers
  • For each item, identify the way it is usually addressed in the software industry. Applying a bug fix: Addressing a security flaw
    10·2 answers
  • Which access control type would you use to grant permissions based on the sensitivity of the information contained in the object
    11·1 answer
  • Write a program that will add up the series of numbers: 99, 98, 97… 3, 2, 1. The program should print the running total as well
    13·1 answer
  • What is humanity’s greatest invention?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!