1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Diano4ka-milaya [45]
2 years ago
14

How to send an email to multiple recipients individually outlook

Computers and Technology
1 answer:
Crank2 years ago
3 0

Answer:

Include multiple people in the "To" section. picture attached below.

You might be interested in
What does an industry expect of you as an employee?<br><br> At least 3 please!
Hatshy [7]
Trusting, loyal, and a hard worker. All indristies want employees who won't backstab, works hard, and is loyal to the company
7 0
2 years ago
Read 2 more answers
Give two relative advantages of the GUI over the CL
Juliette [100K]

Answer:

GUI (Graphic User Interface) Can be used for images whereas CL Focuses on Text Imports

Info:

Here's One Try To Finish It With The Other

3 0
2 years ago
Which should you consider when selecting a highlighting color?
hjlf

Answer:contrast

Explanation:

To make sure it’s easier to read

5 0
3 years ago
Microsoft Excel used for making document and presentation.
dalvyx [7]

Explanation:

Charts that are created in Excel are commonly used in Microsoft Word documents or for presentations that use Microsoft PowerPoint slides. Excel provides options for pasting an image of a chart into either a Word document or a PowerPoint slide. You can also establish a link to your Excel charts so that if you change the data in your Excel file, it is automatically reflected in your Word or PowerPoint files.

5 0
3 years ago
Asymmetric encryption uses (choose all that apply):
yan [13]
Asymmetric uses two different keys (Public keys and private keys) for both encryption and decryption of data.  It is s any cryptographic<span> system that uses pairs of keys: public keys which may be distributed widely, and private keys which are known only to the owner.</span>
7 0
3 years ago
Other questions:
  • Consider the folloeing website URL:http://www.briannasblog.com. What does the "http://" represent?
    11·1 answer
  • 3. Describe what a pre-processor does in a network-based IDS tool such as Snort. Demonstrate your understanding of this function
    6·1 answer
  • When seeking information on the internet about a variety of subjects, the most useful place to look would be
    8·2 answers
  • What the benefit is of folder when working with files
    8·1 answer
  • How to remove duplicates from list in python?
    8·2 answers
  • When you print ____, the presentation is printed with one or more slides on each piece of paper?
    11·1 answer
  • What landforms are likely to form at this boundary
    15·1 answer
  • Haley is helping to choose members for a customer satisfaction team. Which
    6·1 answer
  • What is the biggest challenge for most business when going online?
    12·1 answer
  • Fill in the blank: With ticket ________, you are able to edit ticket properties according to which team owns the ticket.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!