1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paul [167]
3 years ago
15

The benefits of voice mail include eliminating unnecessary chit chat, telephone tag, inaccurate messages, and a. the need for wr

itten messages. b. the necessity of a cordial, friendly greeting. c. time zone barriers. d. prompt responses.
Computers and Technology
1 answer:
jonny [76]3 years ago
4 0

Answer:

The correct answer to the following question is option c.) time zone barriers.

Explanation:

When the maximum length of voice mails is set then, the calls that are sent to the voice mail will only recorded up to the that limit. We can also specify the any value from 1 to 60 minutes.

Note: When the voice mails transcription option is enable then, we can specify the any value between from 1 and 2 minutes.

You might be interested in
Guys how can i video my self from my laptop <br> my laptop is (lenovo)
dalvyx [7]

Answer:

1

Power up your Thinkpad and press the “Start” button on the screen.

2

Select “All Programs” and click “Capture from Video Device.”

3

Adjust the microphone level to the fourth line and click “NEXT.”

4

Create a file name for the video you will capture and select the destination folder.

5

Select “Best Quality” and click “NEXT.”

6

Click “Start Capture” to commence recording and “Stop Capture” to cease it.

7

Click “Finish.”

Explanation:

3 0
3 years ago
Read 2 more answers
How does a security information and event management system (SIEM) in a SOC help the personnel fight against security threats
snow_lady [41]

A security information and event management (SIEM) system in an SOC helps fight security threats by combining data from varying technology sources and analyzing logs in real time, which helps in managing resources to implement protective measures against threats.

<h3 /><h3>Features of a SIEM</h3>

They are tools used to promote information security through the provision of reports that display malicious intrusion attempts and alerts that are triggered in case of violation of established rules for security.

Therefore, through SIEM tools there is greater analysis and collection of data that can impact information security, generating a better classification of threats and investigative capacity to carry out actions to combat system insecurities.

Find out more information about security information here:

brainly.com/question/26282951

6 0
2 years ago
State the difference between font colour and shading.​
Maurinko [17]

Answer:

when you color you are doing the main work and the main part. when youre shading you are doing the backgrounds

Explanation:

art class

4 0
2 years ago
Write a memo to the vice president, outlining the steps an employee might have taken to create an e-mail message and make it app
Natali [406]

Answer:

Following are the memo to the vice president:

Explanation:

In this question, the president claims, that he got a threatening e-mail from the Maui worker. HR acknowledged that all of the workers should always be dismissed, in its protection, that worker claims that he did not send the message but he does not recognize why the message implies him return address. Here is a note for the vice president, who explains how an employee could have produced an email and made it look to be from another worker's account. That stuff we want will be progressively explained as follows:

a) The manipulating and e-mail used only by spammers and attackers were called this technique. In the SMTP server, it sends messages, that you can set up to send your spammer to the email addresses. Instead of a mail confirmation, I d the forger requires the receiver to see the next employee I d email. that recipient doesn't understand who sent the message.

b) The e-mail Systems information allowing for accessible transfer is used by the intruder or forger. It  must use an attacker order to verify communication with the SMTP server command:  

telnet smpt.server.name 25    

Its name of the SMTP server is smpt.domain.name, and the port is 25.

c) when the last stage is successful as well as a link created, this order to imitate an email account only with command can be entered:

MAIL from: Email-id

It creates a problem for the worker that sends the e-mail with the same id

d) Hacker sets the email of the receiver to:  

RCPT to: boss email-id  

It sets the beneficiary as the e-mail above.  

e) By entering an order, you can create the email data:  

DATA It may also adjust the date by using command and Any date we would like to use.  

Date: (date you would like)  

We should settle on the following:  

Subject: (your topic)

f) We press Insert after the topic is written. In this body can then be e-mail forms. It produces the text.  

g) its email forged is forwarded.

3 0
3 years ago
Select the correct answer. Vlad wants to include his goals and target in his résumé. He also wants to add how he can be benefici
Alla [95]

Answer:

Goals and targets in A

how he can be beneficial to the company in cover letter

Explanation:

While writing a resume goals and targets are added to objectives section.Which briefly describes your goals and gives a hint on your overall motives to join an organizations.While to add other information like how can you be beneficial for company a cover letter is attached with resume which contains information like why you are best fit for the job and  how can you be beneficial for this job.

Cover letter makes great first impressions and sometimes basic screening is done on the basis of cover letters.

6 0
3 years ago
Other questions:
  • What does LMS Date Updated mean?
    9·1 answer
  • What country threatens Denmark at the beginning of Hamlet as evidenced in Marcellus’s question, "Why this same strict and most o
    13·1 answer
  • How many cells does the organism have?\
    5·2 answers
  • Explain how the operating system controls the software and hardware on the computer?
    5·1 answer
  • According to the video, some workers who work for themselves, such as Actors, Musicians, or Writers, may have what sort of worke
    7·1 answer
  • What is the name of the process that weighs the alternatives, gathers all necessary information, and can ultimately lead you to
    9·2 answers
  • You are the head of the corporate security department, and the Microsoft teamhas asked you for some assistance in setting the pa
    11·1 answer
  • The number of individual networking address required for the internet is
    9·1 answer
  • Karen works in a department store. Her coworker gave diverse cultural backgrounds. Which statement shows that Karen understand t
    14·1 answer
  • Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual whi
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!