1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ann [662]
2 years ago
15

Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?

Computers and Technology
2 answers:
Lostsunrise [7]2 years ago
4 0

Answer:

aurthor

Explanation:

jok3333 [9.3K]2 years ago
3 0

Answer:

Author

Explanation:

If you have a Microsoft Exchange account, you can share and delegate Outlook e-mail messages, events, contacts, tasks, and notes with people who are on the same Exchange server.

If you have a Microsoft Exchange account, you can share and delegate Outlook e-mail messages, events, contacts, tasks, and notes with people who are on the same Exchange server.Sharing is most often used by peers who are working on the same project. The shared folder appears under a separate account in the other user's navigation pane. Depending on the sharing permissions, the person may be able to read, create, edit, or delete items in the shared foldation involves granting permission to another person, known as a delegate, to receive and respond to e-mail messages and meeting requests on your behalf. You can also grant additional permissions that allow your delegate to read, create, or edit items in your Exchange ac

You might be interested in
Please help Ill give you brainliest if I get 2 answers. Which is used to input information on a laptop?
Ivanshal [37]

Answer:

c

Explanation:

7 0
2 years ago
Why do attackers tend to target public or private Wi-fi networks?
Anika [276]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

A free WiFi connection in a public space can seem like a lifesaver when you are on the go.But if you decide to use public WiFi just be aware that you could be making yourself an easy target for hackers and putting your information and more at risk.

one of the dangers of using a public WiFi network is that data over this type of open  connection is often encrypted and  unsecured ,leaving you vulnerable to a man in the middle attack.It when a cyber criminal exploits a security  flaw in the network to intercept data

  • Avoid connecting to public WiFi connection. i if you must use a public WiFi hotpots also use a virtual privater network to secure your connection.
  • Do not  log in to password protected websites that contains sensitive information when using a public WiFi connection for example banking and social networking sites or even email.
  • Keep your software patched and up to date and all your devices even your mobiles ones to avoid any potential infection by viruses or malware if you do use unsecured public WiFi.

5 0
3 years ago
Which of the following is considered a benefit when using slab allocator?
tatyana61 [14]

Answer:

Option(d) is the correct answer to the given question

Explanation:

The main advantage of slab allocator is that There is no memory is lost because of the fragmentation this is due to some driver data framework has a cache memory that is connected to it.

  • In the slab allocator the resources are repeatedly assigned or free to handle them. It is a type of memory management scheme that is used for distributing resources to the memory.
  • All the other options are not considered as advantages of Slab allocator that's why they are an incorrect options.
7 0
3 years ago
Why we can not see objects around us in the dark​
malfutka [58]

Answer:

We see an object when light falls on it and gets reflected from its surface and enters our eyes. In a dark room, there is no source of light. no light falls on the surface of objects and we do not see them. This is why we cannot see the objects in a dark room.

4 0
3 years ago
"how do we store information in long term memory?"
Andru [333]

Answer:

By saving it in the hard drive.

Hope I helped!

8 0
3 years ago
Other questions:
  • If the current through a heater coil is 5 amp and the supply voltage is 120 volts, the coil resistance is A. 0.04 ohm. B. 24 ohm
    6·1 answer
  • What is binary in computer science ​
    11·1 answer
  • Maria found a cupcake recipe on a cooking blog. However, she would like to read comments and suggestions before she begins bakin
    6·2 answers
  • When evaluating mining results, data mining and evaluating becomes
    6·1 answer
  • You're the network administrator for a company that has just expanded from one floor to two floors of a large building, and the
    7·1 answer
  • What are lexical errors?<br> and fi(a==b)<br> will it be a lexical error or a syntactical error?
    8·1 answer
  • what is musical technology specifically, the origins of its genesis &amp; its importance to the baroque era
    6·1 answer
  • Cryptography has requirements include:
    8·1 answer
  • 11) A single inheritance model means: * A) A class can only have one parent class (superclass) B) A class can only have one chil
    7·1 answer
  • Help me and i'll mark brainliest
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!