Yahoo Answers is shutting down on May 4th, 2021 (Eastern Time) and the Yahoo Answers website is now in read-only mode. There will be no changes to other Yahoo properties or services, or your Yahoo account. You can find more information about the Yahoo Answers shutdown and how to download your data on this help page.

why some will send mail in encrypt format and how do you read the encrypted mail? ?

1> why some will send mail in encrypt format and how do you read the encrypted mail?

2> what is water mark, virtual memory, page file and hyper threading?

3> how do you dedicated one system to only one user?

4> how do you restrict user to login the system?

5> how do set duplex setting while printing and printer?

3 Answers

Relevance
  • Anonymous
    1 decade ago
    Favorite Answer

    1) Someone sent you encrypted mail because they want to ensure no one else could read it. Encryption requires the receiver to have the key to decrypt it. If you don't have that you'll have to go back to them for the key.

    2) Water mark - an near translucent image on the back of a page. Often used to brand the source (e.g., a company name or logo).

    Virtual memory - disk based memory managed by the O/S for applications that require more memory than is available in the system.

    Page File - the file where the virtual memory is kept.

    3) Allow only one person to sign on - typically they are the only ones with an account.

    4) Set the permissions on the user account to limit what they are able to do.

    5) Go to printer options when the print dialog is selected and go to the page where double sided (or duplex printing is set). It is different for each printer.

  • Marvin
    Lv 7
    1 decade ago

    That is a lot of questions.

    I will answer the first one.

    You need to contact the person who sent you the encrypted email and ask them to send it unencrypted or send you the encryption key.

  • 4 years ago

    short answer: particular, he can. there are distinctive tracking suggestions: putting out from key loggers that intercept keystrokes, take prepare display display screen pictures of your lively window and intercept the content textile fabrics fabrics of the mail. additionally there are bussines suggestions that prepare display display screen the time you spend on a specific information superhighway content textile or purposes. usually the worker isn't wakeful that he's monitored as those purposes run in stealth mode. the ideal hence of guard this venture is to invite your company what's the employer's information superhighway usage coverage and attempt to adhere to the regulations.

Still have questions? Get your answers by asking now.