1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivan
2 years ago
15

How to send an email without showing recipients outlook

Computers and Technology
1 answer:
tia_tia [17]2 years ago
4 0

Answer:

Outlook. When you open a new blank email in Outlook, click on the “Options” tab. From there, you'll want to select the Bcc field in the message header. This is your “blind carbon copy” option, meaning that your email recipients will not see other names on the list.

Explanation:

You might be interested in
In the context of programming languages, typically assembly/machine languages lack ____________ in that each operation does some
Marta_Voda [28]

Answer:

"expressibility" is the correct answer for the above question.

Explanation:

  • Expressibility is a term that is used in a programming language to express the idea of logic. It is in the form of a statement. The statement in the assembly or machine level language is written in more lines. But the same statement is written in one line in a high-level language.
  • The above question asked about the term which is more in assembly language and less in a high-level language. That term is expressibility or statement.
5 0
3 years ago
When the logging and managing information flow between management hosts and the managed devices travels on a dedicated managemen
kompoz [17]

What must be considered is the number of IPs that are allowed to access the management network.

We can arrive at this answer because:

  • During the management of information flow, it is necessary to guarantee the security of the system, preventing intruders from attacking.
  • This can be done by restricting authorized IPs to access the management interface.
  • This type of security measure is often neglected in systems that use a dedicated management network, as this type of network can only be accessed by a single device in the same VLAN.

However, the IPs restriction must be considered even in this system, as there are software that can provoke invasions that cause the leak of shared information.

You can find more information about software here:

brainly.com/question/24032221

4 0
3 years ago
Use the modulo operator (%) to get the desired rightmost digits. Ex: The rightmost 2 digits of 572 is gotten by 572 % 100, which
uranmaximum [27]

Hi, you haven't provided the programing language in which you need the code, I'll just explain how to do it using Python, and you can apply a similar method for any programming language.

Answer:

def rightMost(num):

   lenNum = len(str(num))

   rightNum = num%(10**(lenNum-1))

   print(rightNum)

   return(rightNum)

Explanation:

In this function we receive an integer number, then we find how many digits this number has, and finally, we find the rightmost digits; the main operation is modulo (takes the remainder after a division), what we want is to take all the digits except the first one, for that reason we find the modulo of the number when divided by ten to the power of the length of the number minus one, for example, if the number is 2734 we divided by 10^(4-1), where four is the length of the number, this way we get 2734/1000 and the module of it is 734.

5 0
4 years ago
What's the best strategy for avoiding ATM fe
algol [13]

Answer:

Only use ATMs in your

bank's network

Explanation:

they do not charge service fee

3 0
3 years ago
You can deal with gaps in an PHP array in all but one of the following ways. Which one is it? a. Use the array_values() function
viktelen [127]

Answer:

D. Use the array_fill function to replace all gaps in the array with empty strings

Explanation:

The other method can be employed if one wants to deal with gaps in an PHP array except the Use of the array_fill function to replace all gaps in the array with empty strings.

5 0
3 years ago
Other questions:
  • A company that hires only American Indians is practicing
    5·2 answers
  • Which of the following is an example of a fixed expense clothing or rent or entertainment or food
    11·1 answer
  • c++ design a class named myinteger which models integers. interesting properties of the value can be determined. include these m
    14·1 answer
  • Use the STL class vector to write a C function that returns true if there are two elements of the vector for which their product
    14·1 answer
  • What can be designed to create annoying glitches or destoey data?...
    13·2 answers
  • An electronic device that can accept data as input, process it according to a program, store it, and produce information as outp
    6·1 answer
  • Which system is a type of artificial intelligence that uses a database, containing facts and rules, to provide assistance to use
    9·1 answer
  • Memory, as a general construct, is best defined as A) the ability to briefly retain information in the senses. B) the long-term
    12·2 answers
  • You use a(n) ____ program to create, send, receive, forward, store, print, and delete e-mail messages.
    15·1 answer
  • In the previous activity the learner developed an idea for a game, this included the game plot, storyline, characters, interacti
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!