1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
professor190 [17]
4 years ago
12

You can send emails to individuals from your address book. True False

Computers and Technology
1 answer:
MAXImum [283]4 years ago
5 0
I believe the answer is False or I may be wrong
You might be interested in
You purchase a new microphone for your computer to use on S.kype calls. You plug it into the microphone jack, but it doesn’t pic
satela [25.4K]

Answer:

B

Explanation:

Your computer may not have a pre-installed audio input driver or driver corrsponding to said device

4 0
3 years ago
You have a chart that shows 100 data points and you've circled the highest value. Which of the following are you using?
allsm [11]
Option D, The Rudolph Rule is the correct answer.
7 0
3 years ago
Which piece of computer hardware was revised to run hypervisors natively?
lianna [129]
I believe the answer may be S/360-40, (i actually used wiki cuz i was just a bit confused and it says here that the first hypervisors that provide full virtualization were the test tool SIMMON and the CP-40 system. It states that the CP-40 ran on a S/360-40, which was modified to support dynamic address translation.) 
8 0
3 years ago
Read 2 more answers
Dns (domain name system) servers translate all domain names into _____.
pshichka [43]
They translate them into ip addresses.
5 0
4 years ago
Which of the following refers to a failure response resulting in open and unrestricted access or communication?
avanturin [10]

Answer:A)Fail-open

Explanation:After opening ,accessing any operation or function in system or communicating through a network ,results in the failure by factor of not being able to be accessed is known as fail-open.The unrestricted access can occur due to several reason like network issue, origin problem etc.

Other options in the given question are incorrect because mission critical ,default flow and fail secure are not the situations that occur when after opening, access gets restricted. Thus, the correct option is option(A).

6 0
3 years ago
Other questions:
  • Program kalkulator menggunakan bahasa pascal dan pake dua statemen
    11·1 answer
  • Which document lists the planned dates for performing tasks and meeting goals identified in the project plan?
    15·1 answer
  • The sheets that supply the data in a summary sheet are called the
    10·1 answer
  • What is a main cause of a virus on a computer
    6·1 answer
  • Which type of cell references are locked and NOT automatically updated when it’s copied
    8·1 answer
  • You need to design online to form in which users have to type their name and password to log into an application. The password c
    6·1 answer
  • Suggest three ways in which celebrating an occasion influences food choices?
    10·2 answers
  • What are the different Stape of data processing cycle?​
    8·1 answer
  • Renée’s job entails using a company laptop to constantly open other peoples’ workbooks, sorting the data, importing a new sheet
    15·1 answer
  • List two examples of semiconductor materials​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!