1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
musickatia [10]
3 years ago
7

When entering information for a new contact in the address book, Outlook will automatically create a _____. A. Invitation B. Res

ponse email C. Business card D. Calender
Computers and Technology
1 answer:
OLEGan [10]3 years ago
3 0
D:calendar is it i think
You might be interested in
What is the topic of the e-mail? what is the purpose of the e-mail?
const2013 [10]

Answer:

What email are you talking about?

7 0
2 years ago
What does "CYBER-COCKROACH" mean??
katrin2010 [14]

Answer:

The cyber cockroach is the presented external anatomy of a cockroach, with labeled views of photographs from diverse angles in place of diagrams. The cyber cockroach can be navigated around the head, thorax and abdomen with possible close up views of the legs and the images are downloadable

Cyber cockroach is a useful tool for the study of insects of the Blattodea order

Explanation:

3 0
3 years ago
WILL GIVE BRAIINLIEST AND WATER ICE FROM RITA'S!!!!!!!!!
cricket20 [7]

Answer:

When you purchase a connecting flight, checked baggage is usually forwarded to your final destination, and will change planes when you do. ... In some cases if you purchased multiple tickets that are not all on the same carrier you may need to recheck your baggage

Explanation:

3 0
3 years ago
I have a real struggle when it comes to working with strings, whether they're arrays or pointers to strings, and I'm lost cause
neonofarm [45]
In C, you deal with a string always via a pointer. The pointer by itself will not allocate memory for you, so you'll have to take care of that.

When you write char* s = "Hello world"; s will point to a "Hello world" buffer compiled into your code, called a string literal.

If you want to make a copy of that string, you'll have to provide a buffer, either through a char array or a malloc'ed bit of memory:

char myCopy[100];
strcpy(myCopy, s);

or 

char *myCopy;
myCopy = (char*)malloc( strlen(s) + 1 );
strcpy(myCopy, s);

The malloc'ed memory will have to be returned to the runtime at some point, otherwise you have a memory leak. The char array will live on the stack, and will be automatically discarded.

Not sure what else to write here to help you...
6 0
3 years ago
_____ has many knowledge management applications, ranging from mapping knowledge flows and identifying knowledge gaps within org
harkovskaia [24]

Answer:

A. Social network analysis (SNA).

Explanation:

This is explained to be a process of quantitative and qualitative analysis of a social network. It measures and maps the flow of relationships and relationship changes between knowledge possessing entities. Simple and complex entities include websites, computers, animals, humans, groups, organizations and nations.

The SNA structure is made up of node entities, such as humans, and ties, such as relationships. The advent of modern thought and computing facilitated a gradual evolution of the social networking concept in the form of highly complex, graphical based networks with many types of nodes and ties. These networks are the key to procedures and initiatives involving problem solving, administration and operations.

5 0
3 years ago
Other questions:
  • The _____ command icon looks like a small clipboard with a page attached.
    6·1 answer
  • Can someone please help me write a code for this
    7·1 answer
  • Ld' is the instruction with the longest latency on the CPU from Section 4.4 (in RISC-V text). If we modified ld and sd so that t
    15·1 answer
  • On a vehicle with a manual transmission, a frequent mistake is shifting
    11·1 answer
  • _____ is defined as an attraction for a source based on a resemblance between the source and receiver of a message.
    15·1 answer
  • type of weapon of mass decruction taht spreads deadly radioactive material by way of conventinal explosion
    15·1 answer
  • Every page on a website must be updated recently to consider the website updated/maintained
    13·2 answers
  • When was kale discovered?
    9·1 answer
  • What classes should I take in high-school for majoring in computer science?
    9·1 answer
  • 5 points)*list all of the data that needs to be kept track of for the scenario above in a 1nf (flat file) table (20 points)*use
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!