1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vika [28.1K]
4 years ago
14

Which option in Outlook allows a user to look at multiple calendars in a side-by-side fashion?

Computers and Technology
2 answers:
Thepotemich [5.8K]4 years ago
8 0

Answer:

Its A

Explanation:

I just took the review

olya-2409 [2.1K]4 years ago
7 0

Answer: a

Explanation: its a on edge

You might be interested in
In ________- key encryption, two keys, known as a key pair, are created, where one key is used for coding and the other key for
Pavel [41]
In Encryption - ........
7 0
3 years ago
Which characteristic of a company suggests that it has an informal work culture?
goldenfox [79]
The main characteristic of a company with suggests that it operates with an informal work culture is flexible working hours. With this kind of work culture, <span>workers are allowed to alter their workday start and finish times; and are not required to strictly follow the traditional work arrangements of the standard 9 a.m. to 5 p.m</span>
6 0
3 years ago
3. A hyperlink is important because it allows you to ___________. (1 point) click on the link to go directly to a website insert
ikadub [295]
A hyperlink is a link that can direct a person to another website when clicked. So the answer would click on the link to go directly to a website. To insert an image or sound you would use something else. And a hyperlink doesn't restrict a person to just the publisher information. I hope this helps!
3 0
3 years ago
Which two protocols manage neighbor discovery processes on ipv4 networks?.
serious [3.7K]

Answer:

Which two protocols manage neighbor discovery processes on IPv4 networks? TCP and UDP BGP and OSPF ICMP and ARP IPv4 and IPv6

Key Links. Pricing.

Subjects. Medical & Nursing.

Company. About Us.

Find Us.

Explanation:

6 0
2 years ago
Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed
ludmilkaskok [199]

Answer:

script kiddies

Explanation:

script kiddies is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so

8 0
3 years ago
Other questions:
  • In a program called Nature's Notebook, citizen volunteers make and report observations about seasonal changes in plants and anim
    15·1 answer
  • which of the following is involved in ordering an outline. A.grouping B.merging C.organizing D.arranging
    10·1 answer
  • Create a class, using separate files, named DynamicGrades. (2 points) This class has three data members: an int that represents
    13·1 answer
  • Does anyone know how to execute this assignment on Scratch?
    8·1 answer
  • True or false?
    12·1 answer
  • Explain what a hypervisor application is and what it is used for. Pick a hypervisor application and list its requirements
    8·1 answer
  • A security engineer is configuring a wireless network that must support mutual authentication of the wireless client and the aut
    7·1 answer
  • Help me with this, please. Are vacuum cleaners, Cd players, and telephones considered computers? Do they store any data or proce
    8·2 answers
  • Advantages and disadvantages of algorithm​
    5·1 answer
  • The discipline of building hardware architectures, operating systems, and specialized algorithms for running a program on a clus
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!