1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashutka [201]
3 years ago
6

How can you use the Address Book to address an email message? Use the drop-down menus to complete the sentences. 1. Type an emai

l contact in the To bar and choose from the options. 2. Click in the ribbon to open the Global Address List.
Computers and Technology
2 answers:
anygoal [31]3 years ago
6 0

Answer:

1. auto correct

2. address book

Explanation:

Delvig [45]3 years ago
5 0

Answer:

1. AutoCorrect

2. Address book

Explanation:

stan bts ?

You might be interested in
Small programs called _______ are used to communicate with Paris Friel devices such as monitors printers portable storage device
algol13

the answer is D drivers

7 0
3 years ago
Who plays pokemon shield or sword
schepotkina [342]

Answer: I haven’t played but i wanna

Explanation:

4 0
3 years ago
Read 2 more answers
When correctly implemented, what is the only cryptosystem known to be unbreakable?
Leona [35]

When accurately executed, the only cryptosystem known to be unbreakable is called: "One-time Pad" (Option D)

<h3>What is a Crypto System?</h3>

The one-time pad is a cryptographic approach that cannot be broken but needs the usage of a single-use pre-shared key that is not less than the message being delivered. A plaintext is coupled with a unique secret key in this manner.

It should be emphasized that in cryptography, a cryptosystem is a collection of cryptographic algorithms that are required to perform a certain security function, such as confidentiality. A cryptosystem is often composed of three algorithms: one just for key generation, one for encrypting, and one for deciphering.

Learn more about Crypto System:
brainly.com/question/15084188
#SPJ1

Full Question:

When correctly implemented, what is the only cryptosystem known to be unbreakable?

A) Transposition cipher

B) Substitution cipher

C) Advanced Encryption Standard

D) One-time Pad

6 0
1 year ago
The network layer of the Internet model uses the _____________ protocol to route messages though the network.
RUDIKE [14]

Answer:

Capa de Internet. La capa de Internet, también conocida como capa de red o capa IP, acepta y transfiere paquetes para la red. Esta capa incluye el potente Protocolo de Internet (IP), el protocolo de resolución de direcciones (ARP) y el protocolo de mensajes de control de Internet (ICMP).

Explanation:

3 0
3 years ago
Question 4 of 20
Verdich [7]

Answer:

B

Explanation:

8 0
3 years ago
Other questions:
  • Once I have entered text into a presentation, how do I modify the font style of the text? Select the text and use options availa
    9·2 answers
  • Mark of athena ar answers
    6·1 answer
  • A disadvantage of online surveys is that _________. a. it is difficult to access large numbers of potential respondents. b. they
    10·1 answer
  • The advantage of returning a structure type from a function when compared to returning a fundamental type is that
    5·1 answer
  • What can you use on Code.org's Web Lab to find and fix problems when you are writing code for your website?
    13·1 answer
  • Uploading Your Work
    14·1 answer
  • Which is the least technically experienced technical support group?
    7·1 answer
  • Computer operates nearly 100% accurately but why is the phrase'garbage in garbage out'(GIGO) associated with their use?Describe
    15·1 answer
  • Mention two cables that connect the monitor to the system unit​
    9·1 answer
  • When i add someone to canvas course, do they get an invitation?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!