1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solong [7]
3 years ago
13

Freya has queued up some transactions to email to customers and others to print. What steps should she take to select all the sa

les transactions to email
Computers and Technology
1 answer:
il63 [147K]3 years ago
7 0

Considering the situation described above, the steps Freya should take to select all the sales transactions to email is "<u>Filter the sales transaction list using Delivery Method set to Email, and then click the checkbox to the left of the table header row</u>."

<h3>The Process of Filter to batch print or email</h3>

This process follows the steps below:

  • From the Delivery method dropdown menu, select Send later or Print later, then Apply.

  • Select the checkboxes for the transactions to email or print.

  • Select the checkbox at the top of the list to mark all.

Hence, in this case, it is concluded that there is a process to follow QuickBooks to carry out Filter to batch print or email.

Learn more about QuickBooks use here: brainly.com/question/25592743

You might be interested in
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
Many Java programs that you create will receive and process user input. In order to ensure that user input is accurate, you will
Furkat [3]

Answer: True

Explanation: True

4 0
3 years ago
in a mechanism ,when the input goes from a small gear to an output which is a larger gear the speed will _____
dsp73
The speed (rotations per minute) will decrease.
3 0
3 years ago
Clunker Motors Inc. is recalling all vehicles from model years 2001-2006. A bool variable named norecall has been declared . Giv
nikitadnepr [17]

Answer:

The statement (in Python) is as follows:

recalled = modelYear >=2001 and modelYear <=2006

Explanation:

Required

A statement without an if statement to assign true or false to recalled

Using an if statement, the comparison is

if modelYear >=2001 and modelYear <=2006:

    recalled = True

else:

    recalled = False

To rewrite the statement without using the "if" keyword, we simply equate variable recalled to the stated condition i.e.

recalled = modelYear >=2001 and modelYear <=2006

Note that, we assume that there is an input fo variable modelYear

8 0
3 years ago
What would happen if the bitmap or free list containing the information about free disk blocks was completely lost due to a cras
masha68 [24]

Answer:

It can be repaired with disk utility / recovery algorithms

In UNIX it can be done by scanning

In FAT file scan the FAT looking for free entries

Explanation:

When the crash happens, it is not a problem for UNIX and FAT file system

It can be repaired with disk utility/recovery algorithms.

The recovery algorithm is a list of all blocks in all files and takes a compliment as new free file.

In UNIX scanning can be done at all I-nodes.

In FAT file problem cannot occur because there is no free list .If there was any problem than it would have to be done to recover it to scan the FAT looking for free entries.

7 0
4 years ago
Other questions:
  • How would you define the rule of thirds
    5·1 answer
  • What network monitoring technology enables a switch to copy and forward traffic sent and received on multiple interfaces out ano
    9·1 answer
  • Complete the following tasks. When you are finished, click Done to close the lab and move to the next question. After you click
    15·1 answer
  • Which of the following is a quick way to restore the arrow pointer after you have used it for drawing?
    5·1 answer
  • What is the available vector for each resource and the need matrix for each thread. Note that an available vector depicts the qu
    11·1 answer
  • Heeeeeeelp :)<br><br> hwjkwdlfo;pk
    8·1 answer
  • Write a program to input 100 students marks and find the highest marks among the them​
    12·1 answer
  • You want to read input from the user to know how many apples they would like
    10·1 answer
  • Which of the following is a method which can be used to delete a page from a publication?
    6·1 answer
  • This feature allows you to adjust your view to see the lower and upper part of a document
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!