1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solong [7]
3 years ago
12

What is the location used by users to configure delegate access on their own mailboxes? Backstage view > Account Settings Bac

kstage view > Permissions O Inbox > Permissions O Calendar > Permissions​
Computers and Technology
1 answer:
abruzzese [7]3 years ago
7 0

Answer:

A: Backstage view > Account Settings

Explanation:

You might be interested in
In Broadbent's filter model of attention, the stages of information processing occur in which order?
victus00 [196]

Answer:SENSORY STORE, FILTER, DETECTOR, STM.

Explanation:Donald Broadbent in 1958 stated one of the earliest theory of attention,he stated that physical features of messages are used to select one message for further processing and that all others are lost.This differs from inattentional blindness, which is when you focus hard on something and fail to notice unexpected things entering your visual area. He believes that

Information from all of the stimuli presented at any given time enters a sensory buffer with unlimited capacity.

3 0
3 years ago
Which network protocol is used to route IP addresses?<br>A. TCP<br>B. UDP<br>C. IP<br>D. ICMP
ladessa [460]

Answer:

C. IPIP

Explanation:

This protocol is known as an IP that stands for Internet Protocol. This protocol handles the simple task of making sure that the information is routed correctly to and from the corresponding computer machines through the internet. The sending and receiving machines are identified through their Internet Protocol Addresses which lets the protocol know exactly where the information is going and being sent from.

8 0
3 years ago
Several people work with data at Erica’s office. She enters data. One of her coworkers enters new product numbers. Another cowor
Dvinal [7]

Answer:

a software program for storing, managing, and retrieving information

Explanation:

8 0
2 years ago
Suppose two hosts, A and B, are separated by 20,000 kilometers and are connected by a direct link of R = 2 Mbps. Suppose the pro
AnnZ [28]

Answer:

a. (210^6)((210^7)/(2.510^8)) = 1.610^5 bits or 160,000 bits

b. 1.6*10^5 bits or 160,000 bits

c. Bandwidth delay product of link is maximum number of bits that can be in the link

d. Width of bit = Length of link / bandwidth-delay product so 1 bit is 125 meters long. Yes, this is longer than a football field.

e. Width of bit = s/R

Hope this helps :)

3 0
3 years ago
The _________ operator returns the distance in bytes, of a label from the beginning of its enclosing segment, added to the segme
DanielleElmas [232]

Answer:

C. Offset.

Explanation:

An offset operator can be defined as an integer that typically illustrates or represents the distance in bytes, ranging from the beginning of an object to the given point (segment) of the same object within the same data structure or array. Also, the distance in an offset operator is only valid when all the elements present in the object are having the same size, which is mainly measured in bytes.

Hence, the offset operator returns the distance in bytes, of a label from the beginning of its enclosing segment, added to the segment register.

For instance, assuming the object Z is an array of characters or data structure containing the following elements "efghij" the fifth element containing the character "i" is said to have an offset of four (4) from the beginning (start) of Z.

8 0
3 years ago
Other questions:
  • Which of the following is true about images that are arranged in a collumn
    9·1 answer
  • Movies may depict larger-than-life situations, such as calamities, superheroes, and spaceships. A helps show such extraordinary
    11·1 answer
  • EDVAC stands for? on which theory it is made on?
    15·1 answer
  • Suppose you have one particular application that is trying to send data on the Internet but none of the data is making it to the
    15·2 answers
  • Computer hardware without software is useless while computer software without hardware is meaningless. Discuss. Plz provide exam
    15·1 answer
  • A user contacted the help desk to report that the laser printer in his department is wrinkling the paper when printed. The user
    5·1 answer
  • A system is composed of four parts, J, K, L, and M. All four must function for the system to function. The four component reliab
    6·1 answer
  • What function returns a line and moves the file pointer to the next line?
    9·1 answer
  • What is the meaning of url <br>​
    7·1 answer
  • I came here for a answer so why did i get a pep talk
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!