1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ArbitrLikvidat [17]
3 years ago
13

when you sent email your email can be set to automatically keep a copy where do you find these copies​

Computers and Technology
1 answer:
Strike441 [17]3 years ago
7 0

Answer:

It depends on the mail service, but usually there should be a "sent" category.

Explanation:

Under "drafts" there should be an option to "show more" click that then scroll down to sent. from there you should be able to see any email sent from your account.

You might be interested in
unlike the barcode-based tracking system, a radio frequency identification system offers a .
Over [174]

Unlike the barcode-based tracking system, a radio frequency identification system offers a <u>no-contact, no-line-of-sight reading, and tracking system</u>.

What is a tracking system?

A tracking system often referred to as <u>a locating system, is used to keep </u><u>track </u><u>of people or objects in motion and provide an accurate, timely sequence of location data for processing</u>. Human tracking should be understood; more information is provided below.

<u>Any stolen car can be kept </u><u>track </u><u>of across the nation</u> with the use of a tracking system, ensuring that it is returned as soon as possible. A tracking system is a crucial tool for making sure your personnel is safe.

To learn more about tracking system, use the link given
brainly.com/question/15237193
#SPJ4

8 0
1 year ago
BRAINLIEST !!A game design document is like a diary for game developers.
mafiozo [28]
The answer is true. A game design document is like a diary for game developers.
5 0
3 years ago
Which two statements describe features of an ipv4 routing table on a router? (choose two.)
solong [7]

The statements that describe features of an ipv4 routing table on a router include:

  • Directly connected interfaces will have two route source codes in the routing table.
  • If a default static route is configured in the router, an entry will be included in the routing table with source code.

It should be noted that the IPv4 route table is important for listing entries that are in the routing table.

The routing table of every router is unique and can be stored in the read access memory (RAM) of the device.

Read related link on:

brainly.com/question/24958077

7 0
3 years ago
A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
Charra [1.4K]

Answer: Yes

Explanation:

Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system

  • According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.  
  • Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .
8 0
3 years ago
What does clicking and dragging the fill handle in excel
Olegator [25]

Answer:

The fill handle copies the same values, formulas, or fills a series of dates, texts, numbers, and other data to a desired number of cells. ... Click and hold the handle, then you can drag up, down, across over other cells. When you release your mouse button, it auto-fills the content to the cells you dragged over.

5 0
2 years ago
Other questions:
  • Why ois my printer not printing pictjures?
    9·1 answer
  • The following program includes fictional sets of the top 10 male and female baby names for the current year. Write a program tha
    15·1 answer
  • If you press the tab key when you're in in the last cell of a table,
    10·1 answer
  • Suppose that a computer virus infects your computer and corrupts the files you were going to submit for your current homework as
    12·1 answer
  • The computer mouse is used to
    11·1 answer
  • A(n) ________ is a special value that cannot be mistaken as a member of a list of data items and signals that there are no more
    9·1 answer
  • Go online and research the computer topic
    6·1 answer
  • Which one of these is correct PI of a XML document?
    13·1 answer
  • Samantha is part of a project management team working on the initiation phase of a project. What is her team expected to do in t
    5·2 answers
  • identify the difficulties with the k-nearest neighbor algorithm. a. both a and b b. calculate the distance of the test case from
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!