1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marysya [2.9K]
3 years ago
15

Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?

Computers and Technology
2 answers:
ZanzabumX [31]3 years ago
7 0

Answer:

It is Reviewer

Explanation:

I just took the review on edg

DIA [1.3K]3 years ago
4 0

Answer: i’m thinking it’s reviewer

Explanation:

You might be interested in
What is the best method to avoid getting spyware on a machine
monitta

Answer: The best method to avoid getting spyware on a user machine is to download software only from trusted websites. And depending on the machine it might say that "This download you are about to install might have spyware or malware and it might infect your laptop" "Do you wish to continue?"

3 0
2 years ago
Current versions of windows support file names up to ________ characters long
Verizon [17]
Newer, or current versions of Windows from XP to 10 use the NTFS file system. The file system supports up to 255 characters in a file name. The total path length supports up to 30,000 characters.
3 0
4 years ago
A species of snake lives in a rainforest. Which would be an adaptation for this
raketka [301]

Answer:

The Answer is D

6 0
3 years ago
Read 2 more answers
Please help me ASAP
jeka57 [31]

Answer:

Troubleshooting

Explanation:

These actions are called troubleshooting.

Troubleshooting is used to diagnose the unexpected error while you are performing some action on the computer. For example

You are running skype, and a one-day mic or sound performing unexpected error. What will you do? You have to perform the troubleshooting for MIC and sound to diagnose the problem.

During troubleshooting, you will wizard through steps of the procedure to diagnose the problem step by step. If the problem will be identified, the solution will be suggested.

You may experience sometimes your Wifi router at home not working. For this to identify the unexpected error you will perform the troubleshooting.

In short, troubleshooting is used to diagnose unexpected error while performing some action on the computer. If troubleshooting does not work, then close all the programs running on your machine, then shut down your computer. Wait a couple of minutes, and then start your computer and see, the problem may have been alleviated.  

3 0
3 years ago
What is the difference between business strategies and business models?
bogdanovich [222]

Answer:

A . Business strategies include long-term business plans, while business models include plans for daily business functions

7 0
3 years ago
Other questions:
  • Which destination ip address is used when an ipv6 host sends a dhcpv6 solicit message to locate a dhcpv6 server?
    15·1 answer
  • When naming a file you should use the _____________ instead of a space in a filename.
    6·1 answer
  • Computer virus is a<br> a. software<br> b. hardware<br> c. bacteria<br> d. none of these
    13·1 answer
  • You work in the Accounting Department and have been using a network drive to post Excel workbook files to your file server as yo
    9·1 answer
  • Once a virus has been removed by your anti-virus program, all traces of it are gone from your computer.
    9·1 answer
  • How to solve a program that accepts a number as input and prints just the decimal portion
    15·2 answers
  • bryce's computer is acting unusually sluggish today he calls you an it techniician to see if you can find out what is going on a
    14·1 answer
  • You should always be afraid to use the internet<br><br> True or false?
    11·1 answer
  • Now that you have explored several different languages (Python, HTML, CSS, and JavaScript), what can you do to keep straight whi
    7·1 answer
  • to protect a windows 10 system, you've configured system restore to automatically protect your system using restore points. will
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!