1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ArbitrLikvidat [17]
3 years ago
13

when you sent email your email can be set to automatically keep a copy where do you find these copies​

Computers and Technology
1 answer:
Strike441 [17]3 years ago
7 0

Answer:

It depends on the mail service, but usually there should be a "sent" category.

Explanation:

Under "drafts" there should be an option to "show more" click that then scroll down to sent. from there you should be able to see any email sent from your account.

You might be interested in
Type the correct answer in the box. Use numerals instead of words. If necessary, use / for the fraction bar.
andriy [413]

Binary values are used to denote the 'ON' and 'OFF' state of a computer. The 'ON' state is denoted by the binary value '1'

  • The 'ON' state of a computer represents the mode when the computer system is running and can be used to perform computing operations.

  • The binary values '0' and '1' are used to designate the ON and OFF state.

  • When the computer is ON, it is designated by the binary value 1 ; while the OFF state is designated by the binary value 0.

Therefore, the number which signifies the ON state of a computer is 1.

Learn more :brainly.com/question/4722254

4 0
2 years ago
T is important to remember to print the return address when printing an
expeople1 [14]
Shipping label? Ggggggggggggg
6 0
3 years ago
What are the five types of pointing devices?
choli [55]

Answer:

mouse, track ball, stick, touch pad, tablet

6 0
3 years ago
How do you create a algorithm?
aksik [14]
Make sure that each box has an arrow going to it or leading from it, if it needs one. Select “Insert,” then “Shapes,” and choose the Text Box option: Page 2 [Algorithm how-to procedure] 2 Drag the cursor across the document to customize the size of the text box. Click inside the box to begin typing.
brainliest pls
6 0
3 years ago
Read 2 more answers
________ and wpa are wireless security protocols which use encryption to secure wi_fi networks.
ra1l [238]
Im pretty sure its WEP :)
7 0
4 years ago
Other questions:
  • Artists who draw images on a computer often use a stylus in conjunction with special _________ tablets, which offer extra-sensit
    15·1 answer
  • What new information, strategies, or techniques have you learned that will increase your technology skills? Explain why its impo
    7·1 answer
  • Customer Premises Equipment (CPE) includes all devices connected to the PSTN, where the ownership and the responsibility for mai
    15·1 answer
  • • Two advertisers A and B
    8·1 answer
  • Suppose as a computer programmer, you have been assigned a task to develop a program to store the sorted data in ascending order
    9·1 answer
  • Write a program that sorts a vector of names alphabetically using the selection sort and then searches the vector for a specific
    7·1 answer
  • What are the consequences of plagiarism?
    7·2 answers
  • . Write a toString method for this class. The method should return a string containing the base, height and area of the triangle
    10·1 answer
  • Suppose you are developing a data visualization application DataViz which calls some functions from a statistics library class S
    5·1 answer
  • In Secure Electronic Transaction, the purpose of Dual Signature is to link two messages that are intended for two different reci
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!