1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alisiya [41]
3 years ago
14

Place the steps in correct order for activating the resend option in Outlook. Choose Resend This Message Click Actions Open the

sent message. Make additions/edits.
Computers and Technology
1 answer:
Dominik [7]3 years ago
8 0

Answer:

1. Open the sent messages 2. Make additions/edits 3. Click actions                    4. Choose resend this Message  

Explanation:

I got It wrong on Edge, so it showed me the right answer

You might be interested in
A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includ
professor190 [17]

Thay is the malicious actor accomplishing this task is done by using the VBA code.

<h3>What is The Visual Basic button?</h3>

It opens the Visual Basic Editor, in which you create and edit VBA code. Another button at the Developer tab in Word and Excel is the Record Macro button, which robotically generates VBA code that could reproduce the moves which you carry out withinside the application.

To run VBA withinside the “Microsoft Visual Basic for Applications” window, you could simply press “F5” key button or click on the “Run” icon withinside the toolbar.

Read more about the spreadsheet :

brainly.com/question/26919847

#SPJ1

5 0
2 years ago
The advancement in speed of transportation is attributed to invention of this device
morpeh [17]
The automobile is the invention
3 0
3 years ago
which explains a method to avoid violation of personal information through phishing? do not carry around your social security ca
snow_lady [41]

The option that explains a method to avoid violation of personal information through phishing is C. never give out credit information to someone who calls you or emails you.

<h3>What is phishing?</h3>

Phishing is a form of social engineering assault that is frequently employed to obtain user information, such as login credentials and credit card details. It happens when an attacker deceives a victim into opening an email, instant message, or text message by disguising themselves as a reliable source.

Therefore, the option that explains a method to avoid violation of personal information through phishing is to never give out credit information to someone who calls you or emails you.

Learn more about phishing on:

brainly.com/question/23021587

#SPJ1

6 0
2 years ago
Which of the following is true of how computers represent numbers?
Bumek [7]

Answer:

C. Binary can be used to represent more complex, higher level abstractions, including but not limited to numbers, characters, and colors. D. When data is large enough computers switch to using decimal representation instead of binary, because you can represent larger numbers with fewer digits

Explanation:

4 0
3 years ago
Read 2 more answers
Compare the current in two lightbulbs wired in a series circuit
julia-pushkina [17]
<span>The current flow in two light bulbs wired in a series circuit is identica</span>
7 0
3 years ago
Other questions:
  • A __engineer specializes in computer hardware design and integration.
    15·1 answer
  • Is it just me or is brainly not working right now? I am trying to add friends and it won't let me!
    5·2 answers
  • If you are driving at night, you should not use high-beam headlights within _________ of oncoming vehicles. Florida Road Rules 4
    9·2 answers
  • Frank is a writer. He needs to work for long hours and type for long periods on the computer. What injury can Frank develop?
    15·2 answers
  • The Fibonacci numbers are the numbers
    15·1 answer
  • What is the maximum number of WildFire® appliances that can be grouped in to a WildFire® appliance cluster?
    7·1 answer
  • Chen needs to configure a filter on the current folder and would like to filter by the sender of a message. Which tab in the Fil
    7·2 answers
  • We can create tables in MS. Word from *<br> 2 points<br> Insert Tab<br> Home Tab<br> Mailings Tab
    5·2 answers
  • What happens if an email server cannot find a matching username or the mailbox is full
    14·2 answers
  • Hola, alguien aquí me podría ayudar dándome ideas a cerca de office (Word, PowerPoint o Excel) estoy desesperada no puedo pensar
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!