1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ziro4ka [17]
3 years ago
12

What are the characteristics of desktop alerts in Outlook 2016? Check all that apply.

Computers and Technology
2 answers:
monitta3 years ago
7 0

Answer:

A & B

Explanation:

irga5000 [103]3 years ago
5 0

Answer:

A and B are right

Explanation:

Spanish edgy 2020

You might be interested in
A disk with many program and data files scattered on it is said to be ____.
Airida [17]
Fragmented would be the answer
5 0
3 years ago
Which option for creating a table involves the use of a grid of squares?
SSSSS [86.1K]
It’s draw table iirc
4 0
3 years ago
Read 2 more answers
10) What is the BEST way to rewrite sentence (1) to make it more
givi [52]
I believe the answer is D. It makes more sense and is the most correct grammatically.

Hope this helped and pls mark as brainliest!

~ Luna
3 0
3 years ago
Read 2 more answers
To create a public key signature, you would use the ______ key.
olya-2409 [2.1K]

Answer:

To create a public key signature, you would use the <u>_private_</u> key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

4 0
3 years ago
The Mail Merge Wizard can be found in the drop-down list of the _____ icon.
LuckyWell [14K]
It would have to be letter B.
5 0
4 years ago
Read 2 more answers
Other questions:
  • Encrypt the message ENCRYPTION using a tabular transposition cipher with encryption keyword ONE. If necessary, pad the message w
    7·1 answer
  • Which program or security application prevents access between a private and trusted network, and other untrusted networks?
    8·2 answers
  • Jerry is making an address book using a digital database. He has a list of his immediate family and friends but wants to add a f
    9·2 answers
  • Proponents of Internet freedom see its _____________ as providing protection for unpopular expression; proponents of greater Int
    8·1 answer
  • A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s
    12·1 answer
  • How many bits would be in the memory of a computer with 4kb memory?
    8·1 answer
  • The Windows Remote Desktop Web connection that allows users to connect to a work or home computer and access files is considered
    7·2 answers
  • What is a lan adapter
    7·2 answers
  • Rounding up and down for 389,422
    7·1 answer
  • Write a function that reads from a file the name and the weight of each person in pounds and calculates the equivalent weight in
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!