1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexira [117]
3 years ago
12

Kristine has been receiving many emails from a certain address. She thinks that these emails might harm her computer. Which acti

on should she take to automatically send such emails to a separate folder?
Computers and Technology
2 answers:
Paraphin [41]3 years ago
6 0
Report the email adress then block them 
SCORPION-xisa [38]3 years ago
3 0
Mark the email address as spam.
You might be interested in
Question 1: An acronym is a word formed by taking the first letters of the words in a phrase and making a word from them. For ex
jeka94

Answer:

See explaination

Explanation:

def main():

phrase = input('please enter a phrase: ')

acronym = ''

for word in phrase.split():

acronym += word[0].upper()

print('Acronym for ' + phrase + ' is ' + acronym)

main()

See attachment for the output

5 0
4 years ago
A data table is a range that displays what?
shutvik [7]

Answer:

D. The results of changing certain values in one or more formulas

Explanation:

On edge

8 0
3 years ago
Read 2 more answers
In Windows-based systems, a value that specifies the rights that are allowed or denied in an access control entry (ACE) of an ac
blsea [12.9K]

Answer:

C. Access mask discretionary.

Explanation:

Access_Mask is the value that defines the rights used in access control entries (ACE), this value identifies if the trustee is allowed to access a secured object.

It can define rights in three categories: Standard, specific and generic rights.

4 0
3 years ago
Instant messaging allows text only <br> a. True <br> b. False
xenn [34]
False!                           

There are other things you can do like send pictures and etc.
6 0
4 years ago
Which is a gallery of pr design pictures that can be inserted directly in the document​
fredd [130]

Answer:

.,.,.,.,.,.,.,.,.,.,.,.,.

6 0
3 years ago
Other questions:
  • Seasons Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month a
    14·1 answer
  • To create a default value for a parameter in the parameter list of a function, you code a/an ________________ sign after the par
    5·1 answer
  • Which of these jobs would be most appropriate for someone who majors in computer engineering? I need the answer ASAP Helping com
    14·2 answers
  • A group of computers that are interconnected order to share information or document is called a
    12·2 answers
  • Create a network for a company that sells shoes. Describe the hardware needed and the size of the network (PAN, LAN, WAN) and ma
    6·1 answer
  • A machine on a 10 Mbps network is regulated by a token bucket algorithm with a fill rate of 3 Mbps. The bucket is initially fill
    12·1 answer
  • If you face an investigation where dangerous substances might be around, you may need to obtain which of the following?
    13·2 answers
  • Java code?????
    12·1 answer
  • . Which of the following refers to the informal rules for how to behave online? A.
    9·1 answer
  • What is denial service attack?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!