1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trapecia [35]
3 years ago
14

Question 1 of 20 Gus has decided to organize his inbox on June 26 by using folders and deleting irrelevant messages. He creates

a folder called "Project XYZ" for all relevant emails related to this project. Which of the following emails should he save in this folder instead of deleting or moving it to another folder? O A. Schedule Update for Project XYZ B. Update: New Time and Location for May 20 Meeting for Project XYZ C. Time and Location for May 20 Meeting for Project XYZ D. New Project EFG to Launch Next Week SUB​
Computers and Technology
2 answers:
Ber [7]3 years ago
8 0

Answer:

A. Schedule Update for Project XYZ

NemiM [27]3 years ago
7 0

Answer: Schedule Update for Project XYZ

Explanation:

You might be interested in
On the food inventory worksheet, enter a function in cell G1 that counts the number of Food Items. What formula would i use!? Th
Nataly [62]

COUNT function

COUNT function determines how many cells in a range contain a number. We use this function to get the number of entries in a number field in an array of numbers. The formula one can use is G1:[…..]: = COUNT(G1:[…..])






3 0
3 years ago
Pls help will give brainlest!!! The image shows a line graph. Which scientist is most likely to use this visual aid in a present
lapo4ka [179]

Answer:

D

Explanation:

6 0
2 years ago
What types of printed information are useful to obtain from your target employers?
kap26 [50]

Answer:

I think its A and B,hope it helps

6 0
2 years ago
The most serious security threat to Bluetooth-enabled devices is ____, which occurs when a hacker gains access to the device and
Semmy [17]

The most serious security threat to Bluetooth-enabled devices is \sf\purple{bluebugging}, which occurs when a hacker gains access to the device and its functions without the owner's consent.

\large\mathfrak{{\pmb{\underline{\orange{Happy\:learning }}{\orange{.}}}}}

6 0
3 years ago
Positive use of the technology before the pandemic.
Nana76 [90]

Answer:

Positive use of the technology before the pandemic. Is to talk to relatives who live far away. Find a Cool Recipe and to be nice online.

Explanation:

4 0
3 years ago
Other questions:
  • Questions 6 - 9 Refer to the following code: public class WhatsIt { private int[] values; private double average; public WhatsIt
    7·1 answer
  • Helllllp: Virtual private networks require a secure remote connection.<br> True or False?
    10·2 answers
  • ____ indicates the number of pixels that a computer uses to display the letters, numbers, graphics, and background on a screen.
    12·2 answers
  • Boardman College maintains two files—one for Sociology majors and another for Anthropology majors. Each file contains students'
    5·1 answer
  • Name a piece of software you often use where it is easy to produce an error. Explain ways you could improve the interface to bet
    5·1 answer
  • Why would it be hard to find the ideal CO2 level if the light intensity were very low?
    9·1 answer
  • Having data in a column formatted differently based on value is known as
    7·1 answer
  • Select one type of mobile phone connectivity you can use to stream videos on a smartphone
    10·2 answers
  • What type of formula uses data from multiple worksheets
    6·1 answer
  • How much weight does a headgear need to carry
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!