1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olasank [31]
3 years ago
5

DESCRIBE HOW TO CREATE A CUSTOM QUICK STEP

Computers and Technology
1 answer:
Vinvika [58]3 years ago
3 0

Answer:

Open Outlook and ensure that the Home tab is the active one. ...

In the Quick Steps action box, click Create New.

In the Edit Quick steps screen, name your Quick Step in the Name text field.

Select an Action to assign your new Quick Step. ...

Next we'll assign it a Shortcut key. ...

Click the Finish button to complete the process.

Explanation:

You might be interested in
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
AysviL [449]

Complete Question:

Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices.

Group of answer choices:

A. True.

B. False.

Answer:

A. True.

Explanation:

A proxy server is an example of non-security devices with security features because it acts as a hub or gateway between a user and the internet. Therefore, when a user request for resources through a website, the proxy server acts as an intermediary between them and the web server providing such resources.

ACL is an acronym for access control list and it comprises of rules that grant or deny access to resources on a network.

A firewall is a network security system which prevents unauthorized access on a private network by monitoring, controlling and filtering inbound and outbound network traffic (packets) based on a set of security rules.

IDS and IPS are acronym for intrusion detection system and intrusion prevention system respectively. IDS is a security system which monitors the network traffic and notifies the engineer when there's a malicious activity. IPS is a security system which monitors the network traffic and blocks malicious activity as well as keeping logs.

<em>Hence, Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices. </em>

3 0
3 years ago
Can a percent be used in a filename?
alina1380 [7]
Hey There!

A percent can be used in a filename.
4 0
3 years ago
Please help me I don’t know what I’m doing wrong.
Alinara [238K]

Answer:

Explanation:

I noticed the \n, \n will cause the new line break, delete it.

try code below:

<em>System.out.println(" " + " " + "NO PARKING");</em>

<em>System.out.println("2:00 - 6:00 a.m.");</em>

5 0
2 years ago
Mr. Stevens is the principal of a high school. Why might he want to export data from a database of students’ exam scores?
Anna007 [38]

I am not sure but I think that it is either the First option or the Third option but you would probably need more information.

7 0
3 years ago
Read 2 more answers
What is the difference between concrete language and abstract language? give an example of each.
saul85 [17]

The difference between abstract language and abstract language is that abstract language is known through the intellect and concrete language is known through the senses.

<h3>What are abstract and concrete languages?</h3>

The abstract language uses the words like kind, truth, grace, etc. It is a form of language that indicates the intellectual, but concrete language can be known by the senses.

Thus, the distinction between concrete and abstract language is that concrete language is understood via the senses, whereas abstract language is understood through the mind.

To learn more about abstract and concrete languages, refer to the link:

brainly.com/question/16550006

#SPJ4

7 0
2 years ago
Other questions:
  • In this exercise, use the following variables : i,lo, hi, and result. Assume that lo and hi each are associated with an int and
    9·1 answer
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
    9·1 answer
  • How can you tell that a spreadsheet was saved as a 2007 Excel file?
    7·1 answer
  • Which of the following would be the most appropriate way to address and greet your teacher, Mr. Joseph Herman, in an email? Hi J
    7·1 answer
  • If you've finished working with a data file but intend to work on it again during your work session, which button would you use
    10·2 answers
  • In Google search results, how are organic links different from sponsored links?
    5·2 answers
  • If you're a beginner to data analysis, what is the first thing you should check when you build data queries?
    11·1 answer
  • What is geolocation?
    8·1 answer
  • What are five types of applications you can create in Visual Basic 2017?
    12·2 answers
  • How do you stop getting emails from brainly saying "sarah from brainly has answered your question"
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!