1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gennadij [26K]
3 years ago
9

Gina, an IT professional, noticed that the servers were running very slowly. She evaluated the system and made a recommendation

to the workers at her company to improve the performance of the system. She told them that the most important thing they could do to help was to _____.
stop opening attachments

delete unneeded e-mail

log off the system for at least two hours each workday

limit the number of e-mails they replied to each week
Computers and Technology
2 answers:
Leto [7]3 years ago
6 0

Answer:

delete unneeded e-mail

Explanation:

this will free up space

Irina18 [472]3 years ago
4 0
<h2>delete unneeded e-mails </h2>

Explanation:

once you delete unneeded emails you wont have an risk for an slower functioning work day

You might be interested in
In PowerPoint _____ management is extremely important and you must keep track of what links, files, and programs are placed in w
harkovskaia [24]

Answer: File

Explanation:

In PowerPoint _file_ management is extremely important and you must keep track of what links, files, and programs are placed in which folders.

File Management is extremely important because it is necessary for effective system administration.

A good file management system in powerpoint makes compactness, data retrieval and editing achieveable.

6 0
3 years ago
from january 2005 through july 2015, approximately how many electronic data records in the United States were breached, exposing
Brums [2.3K]
From January 2005 through July 2017, approximately 853 million electronic data records in the US were breached.
This allowed the attackers to take control over people's personal data, such as their various credit card numbers, and other important data, as well as their addresses, etc. The cyber police, as well as the regular police have been working hard to stop this from happening, but the hackers are very strong and smart.
4 0
3 years ago
A group of 8 bits is called a... <br> A. hunch <br> B. byte <br> C. dozen <br> D. snack
Mama L [17]
I think that it's called a byte.
5 0
3 years ago
Read 2 more answers
6. Which of the following is malware? (1 point)
marusya05 [52]
Software to damage computers
5 0
3 years ago
Read 2 more answers
Which characteristic of Cloud computing allows data centers to better manage hard drive failures and allocate computing resource
MrMuchimi

Answer:

When working with cloud computing, drive failures and need for usage and data is easily identifiable, so in short term, all of the things that show the user/s what needs to be done is the characteristic.

Explanation:

5 0
3 years ago
Other questions:
  • How many homes can be warmed by one bugatti
    11·2 answers
  • In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-p
    15·1 answer
  • The blue bar across the top of the screen informs you of the Screen Title, or what step you are on.
    5·1 answer
  • Write a test program that creates two Rectangle objects—one with width 4 and height 40 and the other with width 3.5 and height 3
    5·1 answer
  • The ______ printers are the most popular type of printer in small office/home office and large office environments.
    5·1 answer
  • PLZZZ HELP!!!
    9·1 answer
  • Which of the following is not a responsibility of an operating system?
    9·2 answers
  • How will you identify a file type on your computer?
    5·1 answer
  • __________ implements a security policy that specifies who or what may have access to each specific system resource and the type
    8·1 answer
  • Why is it important to prepare the farm resources before you start working? explain​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!