1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
posledela
3 years ago
10

Which option is used in emails to inform the recipient that they should exercise discretion in accordance with sharing the conte

nt of the message?
priority levels
sensitivity levels
follow-up flags
attachment icons
Computers and Technology
1 answer:
Kay [80]3 years ago
5 0
Priority levels hehe good luck!
You might be interested in
File formats are linked to certain programs.<br><br> True<br> False
Lostsunrise [7]
What was the answer?
7 0
3 years ago
Read 2 more answers
Hey plz help me with this<br>What is malware short for?​
soldier1979 [14.2K]

Answer:

Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists of code developed by cyberattackers.

Explanation:

4 0
3 years ago
What is cpu write its parts<br>​
aev [14]

Answer:  a CPU is a central processing unit. They’re responsible for creating and executing instructionsl

Explanation:

6 0
3 years ago
Corona and app inventor can be used to develop ________.
Sidana [21]
<span>Corona and app inventor can be used to develop apps for smartphones. Corona can be used to build both games and apps from major platforms like iOS, Android, Kindle, Apple TV, Android TV, macOS, and Windows. App Inventor was originally provided by Google and is now maintained by MIT.</span>
3 0
3 years ago
Disk ________ realigns separated data so that related file pieces are unified.
PilotLPTM [1.2K]
Disk defragmentation realigns separated data so that related file pieces are unified. <span> Defragmentation is is the process of consolidating fragmented files on the user's hard drive.</span>This Microsoft Windows utility includes <span>rearranging the fragments and restoring them into fewer fragments or into the whole file.
</span>
4 0
3 years ago
Other questions:
  • Often technical personnel who are not familiar with security techniques think that restricting access to ports on a router or fi
    5·1 answer
  • Which of these files, when included in a program, will provide user assistance?
    5·2 answers
  • Which PlayStation was the first to allow connection between it and computer network
    12·1 answer
  • What is used to accurately position objects on the slide using a single horizontal and vertical line that intersects in the cent
    5·2 answers
  • Choose all that apply.
    5·2 answers
  • Which is NOT one of the basic characteristics of life? What feature of Microsoft
    5·1 answer
  • I can't find my grandson someone help
    14·2 answers
  • What do macOS and Windows use to prevent us from accidentally deleting files?
    15·1 answer
  • The most important part of a computer​
    14·2 answers
  • What is the optimal number of members for an Agile team?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!