1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ra1l [238]
3 years ago
15

how can i stop this stupid thing from sending me emails because my school decides to not give you a block option

Computers and Technology
2 answers:
Svetradugi [14.3K]3 years ago
6 0
It’s depends on what you’re using. I can try to help.
tekilochka [14]3 years ago
5 0

Answer:

If it on g mail you go to the spam box and then press the spammers to account and then press block and then you will block them.

You might be interested in
A robot worker and a human worker are both vulnerable to
Lady bird [3.3K]

Answer:

fire

Explanation:

4 0
3 years ago
All the processing-of work-done on a computer is performed by the what?
Nat2105 [25]
It's computed by the processor
6 0
3 years ago
Previous
KonstantinChe [14]

Answer: Internet service provider

Explanation:

5 0
3 years ago
A computer user who purchases a software package that will not operate on his or her hardware configuration is a victim of which
Natalija [7]
Is this a math problem? I don't get what you are trying to say sorry
5 0
3 years ago
What is the name of the hardware device that is used to write the data from hard disk to CD​
mart [117]

it is called a disk drive

4 0
3 years ago
Read 2 more answers
Other questions:
  • In the scene where we see Don and Lina acting in a silent film (beginning at time code 11:05), describe the silent film. How is
    7·1 answer
  • Which type of wireless network is<br> controlled through a wireless<br> access point?
    7·1 answer
  • In general, use no more than _____ font types in a worksheet.
    11·1 answer
  • By applying styles formats are being applied ?
    14·2 answers
  • Describe shortly about the following Linux directories and theirpurpose,1. lib2. etc3. Boot4. Root5. home
    6·1 answer
  • Which of the following is an example of new and emerging classes of software?
    11·1 answer
  • Prepare a risk assessment report (RAR) with information on the threats, vulnerabilities, likelihood of exploitation of security
    14·1 answer
  • JAVA
    12·1 answer
  • Who are all the fnaf characters?
    7·1 answer
  • failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!