1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
3 years ago
6

Trudy is preparing a reply to an email message. Before she could send out the message, she is called for a meeting. If Trudy has

to access her unfinished email after the meeting, in which folder will she find it?
Trudy can access her unfinished email from the
folder.

please help
Computers and Technology
2 answers:
7nadin3 [17]3 years ago
8 0

Answer:

Draft folder

Explanation:

Email services and programs have a “drafts” folder into which the mail that you're currently working on is  periodically saved as long as it has not been sent.

Immediately, you click send the mail moves from the draft folder to the outbox folder and immediately the message is delivered it is moved to the sent folder.

In the drafts folder, you may find most of your work or some of it, it all depends on how often the service updates.

Ronch [10]3 years ago
3 0
Her Drafts folder. Hope this helped!
You might be interested in
Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
Andrei [34K]

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

8 0
3 years ago
What is a computer meaning
goldenfox [79]

Answer:

computer means an electronic machine which process raw data and gives meaningful information to the user

7 0
3 years ago
Help please and thank you :)
Fynjy0 [20]
Answer:First one net is the answer ........
5 0
3 years ago
Overview In this project you need to design and implement an Emergency Room Patients Healthcare Management System (ERPHMS) that
notka56 [123]

Answer:

Overview In this project you need to design and implement an Emergency Room Patients Healthcare Management System (ERPHMS) that uses stacks, queues, linked lists, and binary search tree ( in addition you can use all what you need from what you have learned in this course ) The system should be able to keep the patient’s records, visits, turns, diagnostics, treatments, observations, Physicians records, etc. It should allow you to

Explanation:

3 0
2 years ago
A taxi cab costs $1.25 for the first mile and $0.25 for each additional mile. Write an
Mumz [18]

Answer:

0.25x+1.25=8

Explanation:

Hope this helps

3 0
2 years ago
Other questions:
  • Which of the following statements about the use of desktop publishing software is true
    10·1 answer
  • A(n) _____ is a common output device for hard copy.
    9·1 answer
  • On Gmail, can I have an email get sent to someone at a certain time?
    7·1 answer
  • To place the caption at the top of the image, you will need to change the __________ in the
    5·2 answers
  • 4. In this problem, we consider sending real-time voice from Host A to Host B over a packet-switchednetwork (VoIP). Host A conve
    14·1 answer
  • How important is the mail merge feature of microsoft word in different organization.?
    8·2 answers
  • Who knows a website that can connect videos in your phone
    8·1 answer
  • Which statement about intellectual property is true? (CSI-7.6) Group of answer choices It is okay to use code you find on the in
    14·1 answer
  • What makes you normally visit the site-graphics, layout, or content? Why?​
    8·2 answers
  • A user logs in to a virtual world and creates an animated character representing themselves, which they then use to move through
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!