1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crank
3 years ago
14

Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What shoul

d he do?
A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.
Computers and Technology
2 answers:
sergey [27]3 years ago
3 0
A or C not really sure but I want to help.
drek231 [11]3 years ago
3 0

Answer:

C. Configure a safe sender

Explanation:

It’s dabest thing to do

You might be interested in
Bytes are arrangements of
tigry1 [53]
The answer is B. Eight bits
7 0
3 years ago
Renee just got on the freeway to go to her cousin's house in Denver. She is driving 50 miles per hour. Her sister Kim left one h
defon

let's say they catch-up to each other after t hour.

so

in t hour distance travelled by Renee

d = speed × time = 50t

in t hour distance travelled by Kim

d = speed × time = 60(t-1) + 0×1 = 60(t-1)

Note: here kim didn't covered any distance in first hour and in rest t-1 hour it travelled all distance

now.as distance travelled by both is same so

60(t-1) = 50t

60t -60 = 50t

adding 60 both sides

60t = 50t+60

subtracting 50t both sides

60t -50t = 50t+60 - 50t

10t = 60

dividing by 10 both sides

t = 60/10 = 6

so in 6 hour both will catch-up to each other

3 0
3 years ago
Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is bein
m_a_m_a [10]

Answer:

Star Topology

Explanation:

Star network topologies are common in home networks, where the central connection point may be a router, switch, or network hub. Unshielded Twisted Pair (UTP) Ethernet cabling is typically used to connect devices to the hub, though coaxial cable or optical fiber may also be employed.

5 0
4 years ago
Need answer ASAP
Alinara [238K]

both software coding and testing occurs during Engineering phase

6 0
3 years ago
Horizontal scaling of client/server architecture means _____.
aalyn [17]
<span>Horizontal scaling of client/server architecture means that more machines or more client workstation are added in the network. The impact on the network should be small and negligible. 
Vertical scaling on the other hand means that more power (processing units) are added in the network. </span>
4 0
3 years ago
Other questions:
  • Without exception, you must always stop when ______________.
    14·1 answer
  • Which of the following is NOT a characteristic developed by New Journalism?
    6·1 answer
  • . Virtualization simplifies the use of resources, isolates users from one another, supports replication and mobility, but exacts
    7·1 answer
  • A _____ is a type of legal protection for which person can apply to protect an invention or a discovery.
    9·1 answer
  • How to convert a .enw file into a .pdf without downloading any applications? (If I have to, then I will. Just please tell me.)
    14·2 answers
  • Divide 111001 by 1101​
    7·1 answer
  • Select the correct answer from each drop-down menu.
    13·1 answer
  • You've just installed a new video card in a user's Windows workstation. When the system is powered on the screen is blank. You
    10·1 answer
  • Who tryna trade in gta my psn is xMadOrNawx-_-
    11·2 answers
  • This is an example of what type of formula? =average(d1:d17) question 1 options: addition subtraction range average
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!