Answer:
The PST file format can only be imported into contacts by the outlook
program.
The CSV file type can be created from a document or spreadsheets
and can be imported by multiple email programs.
Explanation:
Answer:
Interval Recording
Explanation:
According to my research on different data collection methods, I can say that based on the information provided within the question this method of data collection is called Interval Recording. This refers to the process of collecting different pieces of data from different parts of the same interview or study. Which is what Mrs. Golden is doing.
I hope this answered your question. If you have any more questions feel free to ask away at Brainly.
<u>Normally windows end user can login 3 ways as follow:</u>
1. End user can Login as local account where user has not connected or even connected to local Area network LAN.
2. Next user can login into cloud accounts nothing but hot mail accounts
3. Login to windows domain controller where end user should connect to LAN.
Purpose of installation of Windows domain controller with Active Directory is to keep trace and keep log history activities.
Due to windows domain controller with Active Directory end user desktop or laptop has control on software access also.
Every time when end user login on windows domain controller a small modified is executed whenever is required. It is not going effort the workstation performances.
Note: - Domain severs should be POWER on first.
The way to respond to the theft of your identity cyber awareness is; To report the crime to the local commission which is the Federal Trade Commission (FTC).
<h3>Protection from Identity Theft</h3>
Identity Theft is basically a crime that happens happens when someone steals your personal information and uses it commit a fraudulent offence.
Now, the person that stole your identity may use the stolen information he got from you to apply for credit, file taxes, medical services or other government privileges.
The acts perpetuated above by the thief could lead to damage to your reputation with credit status and your good name too which could take years to rebuild.
Thus, it is very pertinent to report any case of such to the relevant government commission which in this case is Federal Trade Commission (FTC).
Read more about Identity Theft at; brainly.com/question/15252417
Explanation:
These are the advantages of breaking up a single logical message into a number of fixed sized packets.
- When messages are broken into packets it increases the performance and also the reliability of the internet
- if there is an error in a single packet, this error is not going to affect the entire message.
- the efficiency of the communication line in the internet is improved.
- there is a reduction of traffic. Each packet in a single message can be transmitted through different routes.
- It reduces idleness as each packet can send from different program so each program has a service.