1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saw5 [17]
3 years ago
13

Where does the list of incoming mail appear in gmail

Computers and Technology
2 answers:
kobusy [5.1K]3 years ago
6 0
The tab known as Inbox
disa [49]3 years ago
4 0
In your inbox.................................
You might be interested in
How long does the Splunk search job remain active
Degger [83]
When you run a new search job, the job is retained in the system for a period of time, called the job lifetime. f the job is not accessed within the specified lifetime, the job expires and is removed from the system. There are two lifetime settings, 10 minutes and 7 days. The lifetime starts from the moment the job is run.
8 0
3 years ago
Write a function square_evens(values) that takes a list of integers called values, and that modifies the list so that all of its
Mice21 [21]

Answer:

#create the function

def square_evens(values):

   count_Value = 0

   #loop loop for iteration

   for i in values:

       #check for even number

       if (i) % 2 == 0:

           values[count_Value] = i * i  #store the square in the same index

       count_Value =count_Value + 1

   print(values)  #print the list

# list of integers

values = [1, 2, 3, 4, 5, 6]

#calling the function

square_evens(values)

Explanation:

The above code is written in python. first, create the function square_evens() which takes one parameter of the list.

inside the function declare the variable and then take a for loop for traversing each element in the list. Inside the for loop, we take the if-else statement for checking the number is even. if the number is even then stored the square of that value in the same list. To store the square value in the same index, we take the count variable for tracking the index.

After the all element in the list checked, the program terminates the loop and then print the updated list on the screen.

Outside the function, create the list with an integer value and then calling the function with passing the list argument.  

NOTE: In the python programming, please keep the indentation in code.

5 0
3 years ago
Create a VBScript script (w3_firstname_lastname.vbs) that takes one parameter (folder name) to do the following 1) List all file
leva [86]

Answer:

Set args = Wscript.Arguments

If (WScript.Arguments.Count <> 1) Then

 Wscript.Echo "Specify the folder name as a command line argument."

Else

   objStartFolder = args.Item(0)

   Set objFSO = CreateObject("Scripting.FileSystemObject")

   if (Not objFSO.FolderExists(objStartFolder)) Then

       Wscript.Echo "Folder "&objStartFolder&" does not exist"

   Else

       Set objFolder = objFSO.GetFolder(objStartFolder)

       Set colFiles = objFolder.Files

       For Each objFile in colFiles

           Wscript.Echo objFile.Name, objFile.Size, objFile.DateCreated

       Next

   End If

End If

Explanation:

Here's some code to get you started.

4 0
3 years ago
While going through the network log, Sarah, a network security administrator, noticed substantial outbound network traffic. Whic
VladimirAG [237]

The activity Sarah, a network security administrator, performed by going through a network log and then noticing substantial outbound network traffic is: indicators of compromise (IOC).

Cybersecurity refers to the preventive practice adopted for the protection of computers, software applications (programs), servers, networks, and data from unauthorized access, attack, potential theft, or damage, through the use;

  • A body of technology.
  • Processes.
  • Frameworks.
  • Policies.
  • Network engineers.

In Cybersecurity, it is very important to adopt certain security standards, policies, frameworks, technology, antivirus utility, and best practices, in order to achieve the following:

I. Prevent data theft and data corruption by malwares (viruses).

II. Enhance data integrity and secure (protect) data.

III. Mitigate any unauthorized access or usage of the system network by a hacker.

In conclusion, the indicators of compromise (IOC) refers to the factual evidence on a network device pointing to a security breach or data theft.

Read more: brainly.com/question/24112967

8 0
3 years ago
A technician is working at a client's office after hours and needs two cables to finish the work but does not have immediate acc
svetlana [45]

Answer:

The following are the answers of the given scenario.

  • Crimper
  • Cable tester
  • Cable stri.pper

Explanation:

After hours, the specialist operates at that same customer's workplace as well as wants several wires to complete the job, although it would not provide direct links for pre-built wires. The wire required seems to be a dial-up link from the dial-up network to an original analog POTS port on a wall. Another wire would be to attach an Ethernet from the device to that of the current keystone port on that same wall.

Thus, Crimper, Cable Tester and Cable Stri.pper are the same equipment that the specialist needs to use to create the wires as well as then check whether these all operate correctly.

3 0
3 years ago
Other questions:
  • What is a system analyst?
    12·1 answer
  • Which statement is true?
    5·2 answers
  • What is the best application to create a slide show presentation?
    13·2 answers
  • When does information become a liability for an organization
    6·1 answer
  • Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than
    14·2 answers
  • When a signal travels across network medium, it signal loses strength the further it gets from the transmitting station, to the
    7·1 answer
  • the default name for the small icon that represents a web site or page, and is displayed in the browsers, typically at the begin
    9·1 answer
  • i was playing a mobile game and I was a guild leader in there. one of the members were very disrespectful and they just left bec
    6·2 answers
  • Write Python code that prompts the user to guess Heads or Tails. Your code will continue to display the results and prompt the u
    5·1 answer
  • a benefit of cloud computing is scaling up or down as demand for your services increases or decreases. the word that is most ass
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!