1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xz_007 [3.2K]
3 years ago
6

(Help please I don't know what to choose because it's both text and email but I can only pick one. HELP!!!!!!!!!!)

Computers and Technology
2 answers:
Brut [27]3 years ago
6 0

Answer:

i think you would delete the emails

Explanation:

PilotLPTM [1.2K]3 years ago
6 0

Answer:

contacts

Explanation:

phishing scams are usually when good companies (like apple or google or whatever) are tied to more corrupted companies and it then makes the good company look bad. so im fairly certain its contacts im not 100% positive tho!

You might be interested in
The following types of websites are
zzz [600]
Mmm what are u talking abouy
3 0
3 years ago
Which of the following software program provides for email communication
olga2289 [7]
If "Outlook" is one of the options then thats the answer.
6 0
3 years ago
Read 2 more answers
Think of an example in your life where a number could be described as data, information, and knowledge
zhannawk [14.2K]

Answer:

how many event you have been too in the last month (well non during this time but as an example)

Explanation:

4 0
3 years ago
If I wanted to include a picture of a dog in my document, I could use
11Alexandr11 [23.1K]

Answer:

Online Pictures

Explanation:

8 0
3 years ago
Read 2 more answers
Jose is upgrading the memory on his laptop. The laptop has two slots for RAM, but one of them is currently being occupied. He ha
inn [45]

Answer:

Reseat the new stick of RAM

Explanation:

Joe needs to reseat the new stick of the RAM. For that, he should gently release the clips which hold RAM in the correct posture, and one on each side. Joe is required to do this for each of the available memory modules. And then he will have the cautiously replace all the memory modules( 2 in number) through to DIMM slots which are on the motherboard. Make sure that you have noted down the locations of each notches on the RAM as well as the DIMM slots.

3 0
3 years ago
Other questions:
  • Few people will care if you use their image in a photograph without obtaining their consent. True False
    10·1 answer
  • Which of the following statements regarding EFT is false? EFT still requires the endorsement of a check EFT allows payment to be
    11·1 answer
  • 2. What is the layout of the modern keyboard known as?
    13·1 answer
  • . One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is t
    11·1 answer
  • Which type of password would be considered secure
    13·2 answers
  • A hotel salesperson enters sales in a text file. Each line contains the following, separated by semicolons: The name of the clie
    8·1 answer
  • Describe any five GSM PLMN basic services?
    10·1 answer
  • Study the images of two different fronts.
    7·2 answers
  • One way to initiate a file download from a web page is to
    8·1 answer
  • The purpose of Appetizers on the menu​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!