1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkinab [10]
3 years ago
5

When attaching a file or files in outlook 365 you select the attach command and then select the files location

Computers and Technology
1 answer:
mamaluj [8]3 years ago
3 0

Answer:

When you click the attachment button a window pops up allowing you to select the file/s you want to upload

You can also drag and drop file/s this is an alternative method

Explanation:

Microsoft Outlook is a personal information manager software system from Microsoft.

Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. Wikipedia

You might be interested in
Crossing out answers that could not possibly be correct is called ‘eliminating answers.’ Please select the best answer from the
BaLLatris [955]

The correct answer is True.

Explanation

When we must solve a multiple-choice test or exam, in most cases, we are asked to select only one choice from four or more options. This means we need to know which is the correct answer from the options given to obtain a good grade. Due to this, we must be very precise when responding and paying attention to details because many times the answers are very similar, but only one contains all the elements that answer the question.

One of the most used methods to do this is "eliminating answers" this means we discard answers that we are sure are not possible answers by crossing out these and leaving only the correct answer or a few possible correct answers, in this case, we will need to analyze the remaining answers to select the most appropriate. So, the correct answer is True.

6 0
4 years ago
Read 2 more answers
What are the inputs that the model uses to make decisions?
hodyreva [135]

Answer:

It makes the decision better and adds ownership in the implementation

Explanation:

Hope this helps C:

~Chiena

8 0
2 years ago
Sharon is a network engineer for your firm and is investigating the WAN connection into the hot site. In the event of operations
lisabon 2012 [21]

Answer:

The correct answer to the following question will be "Peak capacity" and "Bandwidth starvation".

Explanation:

Peak capacity has been used to characterize the gradient aqueous phase separation efficiency or performance. It represents the overall conceptual number of operations or components which can be isolated consistently with something like a given set of analytical circumstances and column with

⇒ Rs =1 (Figure 1 and Equation 1)

Certain traffic competing at its policies for the available or unused bandwidth will theoretically enable classes with lower value rates to starve to bandwidth.

Due to these activities, Sharon is concerned about "Bandwidth starvation" and "Peak capacity".

8 0
4 years ago
If a large organization wants software that will benefit the entire organization—what's known as enterprise application software
Ganezh [65]

The organization must develop it specifically for the business in order to get the functionality required is True.

a) true

<u>Explanation:</u>

In software development industry it called as EAS. Where organizations required complete one solution and made most customizable with less cost effective.

Moreover to implement the same organizations has to spend less money for software development and hardware appliances. An organization has clear documented which specific their business requirements and their business future expansion.

Basically in organization from low grade employee to higher employee and meeting is arranged and understand system requirements and compiled as document which is circulated to higher official in organization for their final approval.

5 0
3 years ago
Which of the following are responsibilities of information security management? Defining the protection required for systems and
Talja [164]

Answer:

all of them are responsibilities

Explanation:

4 0
2 years ago
Other questions:
  • Race conditions are possible in many computer systems. Consider a banking system with two methods: deposit(amount) and withdraw(
    14·1 answer
  • What file would you edit to restrict the number of simultaneous logins a user can employ??
    14·1 answer
  • A name given to a spot in memory is called:
    5·1 answer
  • The Polish mathematician Wacław Sierpiński described the pattern in 1915, but it has appeared in Italian art since the 13th cent
    8·1 answer
  • Why is the len ( ) function useful when using a loop to iterate through a stack?
    6·1 answer
  • To what would you compare the transport layer?
    14·1 answer
  • Who initially developed what is now known as the internet?
    5·1 answer
  • What is the best way to improve an online search?
    11·2 answers
  • What happens to runt frames received by a cisco ethernet switch?
    12·1 answer
  • You have been asked to advise a group of several universities who want to combine research efforts and store data in the cloud.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!