1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garri49 [273]
2 years ago
5

Which contact field is used to control the name that would appear in the To field of an email message when a user is sending a m

essage to a contact?
Display As
File As
Save As
Full Name
Computers and Technology
2 answers:
V125BC [204]2 years ago
8 0

Answer:

A. display as

Explanation:

ser-zykov [4K]2 years ago
3 0

Answer:

Display as

Explanation:

Need the same question, but that's my guess, because display, means to show.

You might be interested in
If you sort a portion of an Excel sheet and you get an error message such as #DIV/0, what is a likely cause of the error message
yulyashka [42]
<span>If you sort a portion of an Excel sheet and you get an error message such as #DIV/0, the cause of the error message is (B) one or more cells containing absolute cell references. The possible reason of this error message includes: (1) e</span><span>ntering division formula that divided by zero (0), (2) and that is being used as a reference.</span>
7 0
3 years ago
you have been tasked with configuring a digital information station in the office's lobby. guests will be able to use the statio
REY [17]

The most important security consideration for the station is code signing. With code signing, consumers may feel confident about the software they are downloading and can stop worrying about infecting their computer.

With code signing, consumers may feel confident about the software they are downloading and can stop worrying about infecting their computer or mobile device with malware. Code signing has grown in importance for software developers and distributors as more software may be downloaded from the Internet.

Malware can be easily installed on a victim's computer by an attacker who poses as a trustworthy source. As long as users only download software that is regarded as safe by their operating system, code signing ensures that these types of assaults cannot happen.

Nowadays, the Operating System looks for the digital certificate produced through code signing when software is downloaded onto a computer to ensure the security of the software being installed. The user is informed and given the option to stop or continue the installation if no digital certificate is detected.

To know more about code signing click here:

brainly.com/question/28860592

#SPJ4

3 0
10 months ago
When you print ____, the presentation is printed with one or more slides on each piece of paper?
Artist 52 [7]
When you print handouts, the presentation is printed with one or more slides on each piece of paper. When you print handouts, it's best to have the presentation printed on them for those who can not view the presentation clearly to follow along with. This also serves as a great tool for people who missed the presentation to receive a handout later or for those there to take home and review. 
8 0
2 years ago
What are the main components of a desktop PC and briefly describe their purposes.​
Norma-Jean [14]

Answer:

8 Standard Computer Components and What They Do

Explanation:

Motherboard. The motherboard is an important computer component because it’s what everything else connects to!

Power Supply. True to its name, the power supply powers all other components of the machine.

Central Processing Unit (CPU)

Random-access Memory (RAM)

Hard Disk Drive / Solid State Drive.

Video Card.

Optical Drives.

6 0
2 years ago
What level of system and network configuration is required for cui?
andrey2020 [161]

The level of system and network configuration is required for Cui will be "Moderate confidentiality".

  • The data that really should be safeguarded or disseminated under appropriate regulations, rules, and conservative government objectives or guidelines, would be considered as CUI.
  • The FISMA demands CUI Fundamental to somehow be safeguarded somewhere at the FISMA Conservative category and may even be labeled as CUI as well as regulated.

Thus the above answer is right.

Learn more:

brainly.com/question/14083709

4 0
2 years ago
Other questions:
  • Windows server 2012 r2 includes hyper-v in which edition(s)?
    12·1 answer
  • Describe network in terms of the class computer lab
    9·1 answer
  • What term refers to a device or software system that collects environmental information and makes independent decisions.
    6·1 answer
  • When powering up a home network, make sure all computers and peripherals are turned on before turning on the modem/router?
    11·1 answer
  • List all the components of a computer
    14·2 answers
  • Your program analyzes complex data.
    10·1 answer
  • If you feel your friend had a negative digital identity, what would you do or tell them in order to help them have a positive di
    11·2 answers
  • What is the difference between electrical and electronic devices?
    5·2 answers
  • which of the following devices and and receive information from other device? a parallel port B serial port C video port d both
    8·1 answer
  • List 5 differences between monitors and printers​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!