1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solong [7]
3 years ago
12

What is the location used by users to configure delegate access on their own mailboxes? Backstage view > Account Settings Bac

kstage view > Permissions O Inbox > Permissions O Calendar > Permissions​
Computers and Technology
1 answer:
abruzzese [7]3 years ago
7 0

Answer:

A: Backstage view > Account Settings

Explanation:

You might be interested in
13) When developing film, how do you dispose of fixer as opposed to developer?
MAVERICK [17]

Answer:

B) Developer is poured down the drain while fixer can be reduced

Explanation:

The effluents produced during photographic processing includes, wash water, bleach, fixer, and developer

The developer is an alkaline solution, with a pH of approximately 10.0, while the pH of the fixer is about 4.3, it is therefore, acidic

The rate of discharge of the developer to the fixer is 2 to 1, and the exhausted developer, fixer and process effluents combined are neutral and can be handle by the the treatment works and the drain pipes

Fixer which remain clear can be reused for more than a day, while the spent basic Developer and the acidic Spent Stop Bath can be combined to form a neutral solution, having a pH of approximately 7, which make them less hazardous to be disposed off down the sink into the drain

Therefore, <em>developer is poured down the drain while fixer can be reused</em>

6 0
3 years ago
The following are reasons why many organizations are trying to reduce and right-size their information foot-print by using data
blagie [28]

Answer:

C.<em> improve data quality and reduce redundancies, reduce increased and staggering storage management costs</em>

<em></em>

Explanation:

Excess data retention can lead to retention of redundant and irrelevant data, which can reduce data handling and processing efficiency, while at the same time increasing the cost of data storage and management. This can be curbed be reducing data to the right size by using data governance techniques like data cleansing and de-duplication

6 0
3 years ago
Comment on the following 2 arrays. int *a1[8]; int *(a2[8]); a1 is pointer to an array; a2 is array of pointers a1 is pointer to
Hitman42 [59]

Answer:

The answer is "a1 and a2 is an array of pointers".

Explanation:

In this question, A collection of pointers refers to an array of elements where each pointer array element points to a data array element. In the above-given statement, the two-pointer type array "a1 and a2" is declared that holds the same size "8" elements in the array, and each element points towards the array's first element of the array, therefore, both a1 and a2 are pointer arrays.

5 0
3 years ago
Using tracking code, google analytics can report on data from which systems?
soldier1979 [14.2K]
The correct answers are:
<span>E-commerce platformsMobile
Applications
Online point-of-sales systems
Source and explanation: https://goo.gl/guJKC9
</span>
6 0
4 years ago
According to the Modern Language Association (MLA) style guidelines, which citation is formatted correctly?
aalyn [17]
A) Marian Shelby. “The Fall of Rome.” Military Forces. n.p., 11 Mar 2009. Web.
14 Oct 2012.
4 0
3 years ago
Read 2 more answers
Other questions:
  • In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions thro
    7·1 answer
  • When you send an echo request message with the ping program, a successful attempt will return a(n) ______ message.
    8·1 answer
  • Write a program that will askthe user to enter the amount of a purchase. The program should thencompute the state and county sal
    5·1 answer
  • Explain how to identify a starting position on a line.
    15·2 answers
  • What is a Better Computer?<br> A. Alien<br> B. Microsoft<br> C. Windows<br> D. Apple
    11·2 answers
  • Which of the following are examples of the concept of layered access in physical security? Select one: a. Firewall, IDS, CCTV b.
    11·2 answers
  • Using PowerPoint or Impressed guarantees that your presentation will do which of the following?
    6·1 answer
  • Translate each statement into a logical expression. Then negate the expression by adding a negation operation to the beginning o
    15·1 answer
  • John’s grandparents make wine for special occasions. They add a pinch of yeast to crushed grapes. Over time, this action release
    15·2 answers
  • Who made the first sandwich?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!