1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashutka [201]
4 years ago
15

What are two preferences a user can indicate for the Junk Email folder?

Computers and Technology
2 answers:
Helen [10]4 years ago
6 0

Answer: C

Explanation:

a safe recipients list or a postmark

marysya [2.9K]4 years ago
5 0
Did you mean this?
<span>Controls are divided between two locations: (a) </span>Tools -> Options<span> -> Security -> Junk, and (b) Tools -> Account Settings -> *each account* -> Junk Settings.</span>
You might be interested in
Study the editorial cartoon Participation in Youth Sports Down by Dan Landgren Jr.
Sergeu [11.5K]

Answer:

What is the coordinates of points B in the diagram

Explanation:

D

8 0
4 years ago
Read 2 more answers
54 points!!! Cyber security
Veseljchak [2.6K]

Answer:

a

Explanation:

3 0
3 years ago
If a product can be made and used for a long time into the future, that product is
Ksivusya [100]
I believe it is That product is sustainable.
8 0
3 years ago
What are techniques for active listening? Select all
erastova [34]

Answer:

asking clarifying questions, without interruption

6 0
3 years ago
How serious are the risks to your computer security?
ASHA 777 [7]

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

6 0
2 years ago
Other questions:
  • A company requires an Ethernet connection from the north end of its office building to the south end. The distance between conne
    8·1 answer
  • Data bars describe a graphic element that
    9·2 answers
  • What is the difference between file and directory​
    12·1 answer
  • What do you think is the most fascinating aspect of the internet?
    14·1 answer
  • 2. cien-si-mu-ne ..............​
    13·1 answer
  • The range A2:B4 has how many cells?   A. 2   B. 4   C. 6   D. 8
    11·2 answers
  • Explain what it means to have good file management skills.
    10·1 answer
  • Describe the conventional method of data processing​
    12·2 answers
  • In query design view you can add .............. to limit the number of records shown in the resulting datasheet
    13·1 answer
  • Write a code snippet Now write your own code snippet that asks the user to enter two numbers of integer type (one at a time) and
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!