1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
3 years ago
6

Trudy is preparing a reply to an email message. Before she could send out the message, she is called for a meeting. If Trudy has

to access her unfinished email after the meeting, in which folder will she find it?
Trudy can access her unfinished email from the
folder.

please help
Computers and Technology
2 answers:
7nadin3 [17]3 years ago
8 0

Answer:

Draft folder

Explanation:

Email services and programs have a “drafts” folder into which the mail that you're currently working on is  periodically saved as long as it has not been sent.

Immediately, you click send the mail moves from the draft folder to the outbox folder and immediately the message is delivered it is moved to the sent folder.

In the drafts folder, you may find most of your work or some of it, it all depends on how often the service updates.

Ronch [10]3 years ago
3 0
Her Drafts folder. Hope this helped!
You might be interested in
Does out-of-order makea machine's performance more or less
irina1246 [14]

Answer:

It would be correct to say that out-of-order makes a machine's performance more sensitive to branch prediction accuracy.

Explanation:

This can be explained as when a machine is out-of-order, in that state the  execution holds importance in prediction accuracy, any increase in these results in rate of prediction near about 25% for the single-issue operating in-order. This is due to the reason that some of the predictions are required for the global pattern history. Most recent outcomes are recorded in the register and for a 4-way machine which is out-of-order, accuracy is very poor as a result of the delay of the branch history for next prediction.

3 0
3 years ago
Nanotechnology is a scientific area that deals with making or changing things that are incredibly _______________.
Dima020 [189]

Answer:

small

Explanation:

Nanotechnology deals with incredibly small things on the nanoscale.

3 0
3 years ago
What security principle does a firewall implement with traffic when it does not have a rule that explicitly defines an action fo
NemiM [27]

Answer:

Implicit deny

Explanation:

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

When a firewall encounters a traffic it does not have a rule that explicitly defines an action for that communication, it implicit deny.

7 0
3 years ago
The best defense against injection attacks is to
Sergeeva-Olga [200]
The best defense against injection attacks is to develop secure habits and adopt policies and procedures that minimize vulnerabilities. Staying aware of the types of attacks you're vulnerable to because of your programming languages, operating systems and database management systems is critical.
5 0
2 years ago
A company has a custom object named Warehouse. Each Warehouse record has a distinct record owner, and is related to a parent Acc
PilotLPTM [1.2K]

Answer:

Lookup.

Explanation:

Lookup is the relationship that developer would use to relate the Account to the Warehouse.

8 0
3 years ago
Other questions:
  • Which of the following is the core of an operating system that maintains the computer’s clock, starts applications, and assigns
    7·1 answer
  • If your vehicle catches fire while you are driving, you should:
    5·2 answers
  • What best compares potrait and landscape orientations
    6·1 answer
  • Which of the following statements is true? Methods and instance variables can both be either public or private. Information hidi
    11·1 answer
  • Samuel is working on decimal and binary conversion for his college project. He is using the binary number 111011 and wants to ex
    10·2 answers
  • Please help! i need to answer this soon!
    13·1 answer
  • Consider the following code: // Merge mailing list m2 into m1 void merge (MailingList m1, MailingList m2) { for (int i = 0; i &l
    12·1 answer
  • A ______ is an exact duplication of the hard drive, including data files, system files, and settings, application files, and the
    15·1 answer
  • I have a question about this programming assignment. The outcome when the user puts in Taylor for guest one and Fernando for gue
    7·2 answers
  • Write IF() function for student 3, If total mark is greater than 10 then print
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!