1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ArbitrLikvidat [17]
3 years ago
13

when you sent email your email can be set to automatically keep a copy where do you find these copies​

Computers and Technology
1 answer:
Strike441 [17]3 years ago
7 0

Answer:

It depends on the mail service, but usually there should be a "sent" category.

Explanation:

Under "drafts" there should be an option to "show more" click that then scroll down to sent. from there you should be able to see any email sent from your account.

You might be interested in
What type of adventure/puzzle computer games can I download and not have to pay for? Some games that I've played are Legend of Z
Y_Kistochka [10]

Answer: Pirate and wizard 101, also try using an emulator for a certain console like NES to play certain games you can think of that are available on that console.

5 0
3 years ago
Read 2 more answers
What can you find the under the privacy policy section of a shopping website?
masya89 [10]

The privacy policy will tell you what the site will do with your information.

7 0
3 years ago
What is the part of the browser window that displays the content of the web page such as pictures and text called?
iragen [17]
The frame is a part of the web page or browser window
5 0
3 years ago
A developer of a relational database refers to a file as a
goldenfox [79]
This is the correct Answer    <span>Attribute</span>
5 0
3 years ago
In implementing Security Life Cycle:__________
Dvinal [7]

Answer:

b) one needs to follow through all phases, assessment, design, deploy and manage security

Explanation:

The security life cycle is a process in which it involves the security artifacts for developing the software through a lifecycle. It contains a detailed plan that derives how to create an application form

At the time when the requirements and activity related to design is finished the next step is the software implementation. In this, the developers begins with the coding as per the requirements and designs discussed in the last step

Therefore according to the given options, the second option is correct

7 0
3 years ago
Other questions:
  • What does BMP stand for?
    10·2 answers
  • TLS is not generally compatible with SSL because:__________. 1. SSL is proprietary while TLS is open 2. SSL can interact with it
    10·1 answer
  • Select the correct answer.
    5·1 answer
  • True or False? In C++, the expression (a + b / c) / 2 is implicitly parenthesized as ((a + b) / c) / 2.
    9·1 answer
  • Orphan record example?
    8·1 answer
  • "A switch passes data based on the MAC address."A. TrueB. False
    15·1 answer
  • write a program that reads in the length and the width of a rectangular yard . your program should compute the time required ( i
    5·1 answer
  • Top Down Design makes it easier to solve a problem by:___________
    10·1 answer
  • They are correct? thank you!
    5·1 answer
  • Joining a computer to active directory involves joining the computer to a workgroup. True or false.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!