1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
deff fn [24]
3 years ago
5

Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a

Computers and Technology
1 answer:
Scorpion4ik [409]3 years ago
6 0

Answer: Configure a response for external senders,

Explanation:

Based on the information that we have from the question, Kylee can configure a response for external senders, which will help in ensuring that when the client sends the email, it'll be forwarded to a coworker for immediate handling.

Therefore, based on the options given, the correct option is A

You might be interested in
What can be can be considered data
gavmur [86]

Answer:

The amount of data you use while talking on a phone is a form of data.

Explanation:

8 0
3 years ago
Write the following function without using the C++ string class or any functions in the standard library, including strlen(). Yo
dolphi86 [110]

Answer:

The function in C++ is as follows

int chkInd(string str1, string str2){    

int lenstr1=0;

while(str1[lenstr1] != '\0'){  lenstr1++;  }

int index = 0; int retIndex=0;

for(int i=lenstr1-1;i>=0; i--){

   while (str2[index] != '\0'){

       if (str1[i] == str2[index]){

           retIndex=1;

           break;         }

       else{   retIndex=0;      }

  index++;    }

  if (retIndex == 0){   return i;   }else{return -1;}}

}

Explanation:

This defines the function

int chkInd(string str1, string str2){    

First, the length of str1 is initialized to 0

int lenstr1=0;

The following loop then calculates the length of str1

while(str1[lenstr1] != '\0'){  lenstr1++;  }

This initializes the current index and the returned index to 0

int index = 0; int retIndex=0;

This iterates through str1

for(int i=lenstr1-1;i>=0; i--){

This loop is repeated while there are characters in str2

   while (str2[index] != '\0'){

If current element of str2 and str1 are the same

       if (str1[i] == str2[index]){

Set the returned index to 1

           retIndex=1;

Then exit the loop

           break;         }

If otherwise, set the returned index to 0

       else{   retIndex=0;      }

Increase index by 1

  index++;    }

This returns the calculated returned index; if no matching is found, it returns -1

  if (retIndex == 0){   return i;   }else{return -1;}}

}

4 0
3 years ago
Hi I need help, This assignment is for Assignment 6 Question 4 in edhesive for computer science. here is the prompt:
Alex17521 [72]

Answer:

Following are the python code to print the given pattern:

print('FOURTH') # using print method

for i in range(10): #using loop to count numbers

   for j in range(10-i): # use loop to print asterisk value in reverse order

       print("*", end=" ") #print value

   print("") #using print method for space

Output:

Please find the attachment.

Explanation:

The description of the above python program can be described as follows:

  • In the first line, use the print method, that print message "FOURTH".
  • In the next line, two for loop is used in which the first loop counts the number to be print value, inside the loop another for loop is used.
  • In this loop, it prints asterisk values in its reverse order and for new lines, it will use the print method with a single white space.

7 0
3 years ago
a _____ is a recreation of a thumbnail in a desktop publishing software, also known as a "rough". a. proof b. digital draft c. l
Dmitrij [34]
D. It’s a sketch. That is, if you talking about, an art piece.
6 0
3 years ago
You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
svetlana [45]

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

4 0
3 years ago
Other questions:
  • I will give the brainly or whatever its called
    15·2 answers
  • A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. ______
    15·1 answer
  • How do you know if your phone has a virus?
    13·1 answer
  • You are building a network and need to connect five computers in an office. They will be on the same network segment and you sho
    5·1 answer
  • What is the difference between the Internet and the World Wide Web? Explain in your own words.
    13·2 answers
  • Create a text file named employee.dat containing the following data: b. Write a C++ program to read the employee.dat file create
    6·1 answer
  • Research and build a chroot jail that isolates ssh users who belong to the restrictssh group. (You will also need to create the
    9·1 answer
  • Where do the projection lines converge in a perspective sketch?
    13·1 answer
  • Which phrase is the best definition of sparklines in Excel 2016?
    8·2 answers
  • This seems like a good time to ask the basic question, “How’s it going in class?” Feel free to offer constructive feedback about
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!