1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kay [80]
2 years ago
7

Michael needs to ensure that those items that are automatically archived are still easily accessible within Outlook. Which optio

n should he configure?
Delete expired items
Prompt before AutoArchive runs
Clean out items older than
Show archive folder in folder list
Computers and Technology
2 answers:
rjkz [21]2 years ago
8 0

Answer:

D.   Show archive folder in folder list

Explanation:

Other dude is wrong

Andru [333]2 years ago
6 0

Answer:

Show archive folder in folder list

Explanation:

The three options:

Delete expired items

Prompt before AutoArchive runs

Clean out items older than

do not make archive easily accessible.

That leave the only and correct answer to be Show archive folder in folder list.

You might be interested in
What is one of the differences between Random Access Memory (RAM) and Read Only Memory (ROM)? RAM is where files are stored, and
Dmitry [639]

Answer:

Characteristics of RAM or ROM memory

Explanation:

RAM (Random Access Memory).  

• It is a read (R) and write (W) memory (R/W)

• Types of RAM - SDR SDRAM, RDRAM, DDR SDRAM. The difference is the speed in sending data.

• It is used for the operating system, programs and most of the software.

• Recommendations of at least 8 GB of RAM for PC and   At least 2 GB of RAM for a mobile.

ROM (Read Only Memory)

• Store instructions and data permanently

• it's read only

•  Type of non-volatile memory

• Save data and system information, settings and programs

• Types of ROM - Mask ROM, PROM, EPROM and EEPROM.

  • A PC must have at least 256 GB.

4 0
3 years ago
Read 2 more answers
When you park on a hill, think about which way _____.
Vinil7 [7]

I don't see why this is on a computer section but either way I would chose D because naturally when you park on a hill you would be cautious about your car going into motion down the hill so therefore you would think of which way gravity would pull your vehicle

7 0
2 years ago
Read 2 more answers
An alteration threat violates information integrity. <br> a. True <br> b. False
Art [367]
The answer is True


It intentionally or unintentionally compromises a system by making unauthorized changes to data. As compared to intentional changes which are usually malicious, unintentional changes are normally accidental. Changes and modifications to the system configurations can also compromise integrity. Such modifications might include deleting, changing, and creating information in a network resource. It is best to implement mechanisms on how one can track and audit such changes as they happen




6 0
3 years ago
Different organizations implement different Information Systems base on their core business operations. explain
Mashutka [201]

Answer:

Different business or firm tend to enforce different Information Systems based completely on their main business operations, in order to best leverage data as an organizations asset. Some of these Information System are as follow:

a) Transaction Processing System (TPS):

A small organization tends to process transactions that might result from day-to-day activities, such as purchase orders, creation of paychecks and thus require using TPS.

b) Management Information System(MIS):

Managers and owners of small organizations tend to incline towards industry-specific MIS, in order to get historical and current operational data, such as inventories data and sales.

c) Decision Support System (DSS):

A DSS to allow managers and owners of small organizations to use predefined report in order to support problem-resolution decisions and operations planning.

7 0
3 years ago
Give two reasons why it is important to upgrade your browser when a new version becomes available.
kupik [55]
1. Higher speed
2. New features
3. Less bugs
4. Upgrades
4 0
3 years ago
Other questions:
  • (If the link is not working, search for "Veritasium Levitating Barbecue". At approximately the 2 minute mark, the screen shows 8
    9·1 answer
  • NEED HELP(10 POINTS) PLEASE HELP MATH
    8·2 answers
  • What is another name for a central processing unit? Computer Integrated circuit Microprocessor Transistor
    9·2 answers
  • Your organization issues devices to employees. These devices generate one-time passwords every 60 seconds. A server hosted withi
    15·1 answer
  • Write a function to reverse a given string. The parameter to the function is a string. Function should store the reverse of the
    12·1 answer
  • Consider the program below: public class Test { public static void main( String[] args ) { int[] a; a = new int[ 10 ]; for ( int
    5·1 answer
  • Second Largest, Second Smallest Write a program second.cpp that takes in a sequence of integers, and prints the second largest n
    15·1 answer
  • You have a small business.Due to the recent pandemic you seem to be losing contacts with your suppliers and customers.You want t
    10·1 answer
  • -) An attribute is a(n)?
    5·1 answer
  • Wht is these things Aᔑ bʖ cᓵ d↸ eᒷ f⎓ g⊣ h⍑ i╎
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!