1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dima020 [189]
3 years ago
9

What form of contacts can be shared in Outlook 2016?

Computers and Technology
2 answers:
ArbitrLikvidat [17]3 years ago
5 0

Answer:

shared contacts

Explanation:

gtnhenbr [62]3 years ago
3 0

Answer:

Folders of Contact

Explanation:

You might be interested in
Explain vividly any operating system of your choice stating at least 3 distinguishing features of each version.
rosijanka [135]

Answer:

microsoft windows, macOS, and linux

Explanation:

if you need help let me know

7 0
3 years ago
Read 2 more answers
Provide all resonance structures of the sigma complex when aniline reacts with an electrophile to yield the para-substituted pro
Nadya [2.5K]

Answer:

See attached picture.

Explanation:

See attached picture for detailed explanation.

3 0
3 years ago
Cars are only as safe as their driver, so __ is your bet to lower your risk.
lara [203]

seatbelt

Explanation:

Seatbelt lowers your momentum so it can take impact to be less dangerous

7 0
3 years ago
What is the output of the following code? (Please indent thestatement correctly first.)
goldenfox [79]

Answer:

no output, it does not print any thing

Explanation:

if-else statement is used to execute the statement after checking the condition if the condition is true, it allows the program to execute the statement otherwise not.

in the code, define the variable with values x = 9, y = 8 and z = 7.

Then, if the statement checks the condition 9 > 9, the condition is false.

So, the program terminates the if statement and executes the next statement but there is no next statement.

the other if-else statement is within the if condition which already terminates.

Therefore, there is no output.

7 0
3 years ago
Which of the following could be omitted from a company's AUP? A.Permissible lunchtime online activities B.Employees' home email
joja [24]

Answer:

i think the answer is D

Explanation:

a , b , and c are things customers need to know . but using common sense would let you know that you need to have a strong password so i think it's D! let me know if this helped!

3 0
3 years ago
Read 2 more answers
Other questions:
  • All of the following are methods of communication
    8·2 answers
  • All users on the network have antivirus software; however, several users report that they have what an administrator described a
    10·1 answer
  • An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongo
    11·2 answers
  • In file hashing, a file is read by a special algorithm that uses the value of the bits in the file to compute a single number ca
    13·1 answer
  • A network address is 131.247.160.0/19. The 19 implies that
    5·1 answer
  • Give state diagrams of DFAs that recognize the following languages.
    6·1 answer
  • T FROW PYCW GCYN TA T ODYHP WQROW TW<br><br> Someone decode pls
    14·1 answer
  • .Ashley is creating a new logo for her client that should be a vector graphic. Which is classified as a vector editing software?
    8·1 answer
  • Write a python program that requests a positive integer from the user, determines if it is a composite, a prime or neither prime
    8·1 answer
  • Design an algorithm to find the weighted average of four test scores. The four test scores and their respective weights are give
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!