1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weqwewe [10]
3 years ago
12

Richard uses Microsoft outlook as his email client. He wants to check whether he has received any new mail. Identify which key R

ichard should press to refresh his mailbox.
Computers and Technology
1 answer:
Kazeer [188]3 years ago
4 0
Refresh...... I mean, that is what I hit
You might be interested in
Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
lbvjy [14]

Answer:  you can say  or talket to them why or how

Explanation:

4 0
3 years ago
Read 2 more answers
Describe psychographic differences among the past five generations of Americans that you learned about in this course. What type
Hunter-Best [27]

i would love to help i just dont understand

7 0
2 years ago
Caroline has been asked to find a standard to guide her company’s choices in implementing information security management system
koban [17]

Answer:

ISO 27002

Explanation:

The acronym ISO stand for The International Organization for Standardization. its a non governmental body that is responsible for setting standards guide internationally.

while NIST stand for National Institute of Standards and technology and it is also a body that is responsible for setting up standard guide in the US..

ISO 27002  is a standard code for implementing information security management systems. while  ISO 27017 is for cloud security.  NIST 800-12 is a general security and NIST 800-14 is for policy development. thus option A is correct.

Note :

All code preceded by ISO is from The International Organization for Standardization and are international standard. while those preceded by NIST is from National Institute of Standards and technology  and are not international standard.

7 0
3 years ago
Hello safiya77 this is for you
Ray Of Light [21]
Hello astropiggy!
Feel free to ask any question!
I’ll try my best to answer them!
5 0
2 years ago
Which of the following best explains how symmetric encryption are typically used?
Y_Kistochka [10]

A: Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

6 0
3 years ago
Other questions:
  • DMA controllers ____.A) do not utilize an additional, special purpose, processorB) are a nonstandard component in PCs of todayC)
    7·1 answer
  • Can a percent be used in a filename?
    13·1 answer
  • Why might a peer-to-peer network not be the best choice for a large corporate office setting?
    14·1 answer
  • You can toggle between different types of references by pressing the ____ key on your keyboard.
    15·1 answer
  • Is there a way to earn free robux
    7·2 answers
  • Which step in the software development life cycle involves making improvements based on user feedback?
    15·1 answer
  • Employers are looking for an employee?<br>​
    9·1 answer
  • The phrase ________ refers to data that is inaccurate, incomplete, or erroneous.
    6·2 answers
  • Quick I need help ASAP
    7·2 answers
  • Complete the sentence.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!