1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nonamiya [84]
3 years ago
14

Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?

Computers and Technology
2 answers:
alex41 [277]3 years ago
7 0
It’s the last one! because the other options don’t mention spam which is often moved to junk by the computer.
Sloan [31]3 years ago
3 0

Answer:

The last one

Explanation I think it is D because all of the other answers are saying what happen if you filter it.

You might be interested in
Suppose we have a 4096 byte byte-addressable memory that is 32-way high-order interleaved, what is the size of the memory addres
iogann1982 [59]

Answer:

7

Explanation:

Given that :

Byte-addressable memory = 4096

Order = 32

Rwqritying such that they have the same base ;

4096 = 2^12

32 = 2^5

2^12 - 2^5

12 - 5 = 7

4 0
3 years ago
The program below is used to calcualte the sum of 3 numbers. There is an error in this program. Which line contains the error? n
djyliett [7]

Answer:

  1. num1=10
  2. num2 =20
  3. num3="30"
  4. sum = num1+num2+num3
  5. print (num1)
  6. print (num2)
  7. print (num3)
  8. print (sum)

The error is at line 3. The variable num3 has been assigned a string value with use of the quotes.

To fix the error, take away the quotes from the number 30, since the arithemetic operation cannot be carried out on the string in python program language.

Explanation:

5 0
3 years ago
Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o
polet [3.4K]

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

8 0
3 years ago
What is the name given to the parts of a computer that you can actually touch.
Minchanka [31]

Answer:

Hardware

Explanation:

Hardware is actually we can touch, feel and see in computer.

6 0
3 years ago
The utility ___ is a map that connects each possible bundle to the corresponding level of utility that a person gets from consum
docker41 [41]

Answer:

function

Explanation:

Utility depicts the satisfaction that a user gets in consuming a good or service.  It can be in the form of form, time, possession and place.

Utility function is used to measure how a user behaves when they receive or consume a product or service relative to how they behave when they receive other products/services. It is a widely used tool for measuring users' preferences over a series of products/services. It can be thought of as a map that connects each possible bundle of service to the corresponding utility that a person will get from consuming it.

With utility function, companies can track the way their products/services are being viewed by consumers thus allowing them to make logical business decisions.

3 0
3 years ago
Other questions:
  • 24 bit or 16 million colors is often called?
    7·1 answer
  • 1. Explain what is meant by the following data types:
    11·1 answer
  • What is the method for removing a domain controller in windows server 2012 r2?
    15·1 answer
  • The media literacy movement hopes to _____.
    15·2 answers
  • Since the value we want to receive is either true or false, it makes the most sense to use:
    14·1 answer
  • What is most important to print out and keep offline?
    12·2 answers
  • 16. The Nintendo Entertainment System (NES) saw its sales skyrocket as a result of the launch of which of the following games?
    14·1 answer
  • computer is an electronic machine that is used for data processing to produce meaningful information explain in statement​
    5·1 answer
  • Find the error and rewrite the code with the error fixed.
    11·1 answer
  • The short-range two-way communication technology behind contactless payments is called ____.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!