1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
taurus [48]
2 years ago
9

What is the topic of the e-mail? what is the purpose of the e-mail?

Computers and Technology
1 answer:
const2013 [10]2 years ago
7 0

Answer:

What email are you talking about?

You might be interested in
Weird canvas submission, I’ve done directly what the directions say to do to submit it, but it won’t submit
Step2247 [10]

Answer:

Explanation:

Open Assignments. In Course Navigation, click the Assignments link.

Select Assignment. Click the title of the assignment.

Submit Assignment. Click the Submit Assignment button.

Add File. To upload a file from your computer, click the Choose File button [1]. ...

Add Another File.

6 0
3 years ago
2ND LAST QUESTION
pychu [463]

Answer:

B

Explanation:

3 0
3 years ago
The physical layer of the OSI model is not foundational to any of the other layers. True or False
galina1969 [7]

Answer:

False.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

The physical layer of the OSI model is the first layer of the OSI model and it is foundational to any of the other layers because it determines the means of transmitting (sending) raw bits from one network node to another and the electrical specification of network equipments.

5 0
3 years ago
Information technology student Roberta has been assigned a project on how to detect unwanted outgoing attacks. Which step is par
tino4ka555 [31]

The attacks from the malware and the viruses to the system are considered as the unwanted attacks. These attacks detection can be performed by ensuring whether the system responds to port 443 by initiating Apache.

<h3>What is the function of port 443?</h3>

The port 443 in the computer system is the virtual port that functions with the diversion of the network. The presence of the unwanted attack blocks the response of the port 443.

Therefore, to detect the attack, the response of the system to port 443 with the starting of Apache must be checked.

Learn more about port 443, here:

brainly.com/question/13140343

#SPJ1

5 0
2 years ago
If there is only a stop sign posted at a railroad
Lunna [17]

Answer:

false , those are called passive railways

3 0
3 years ago
Other questions:
  • The array index can be any nonnegative integer less than the array size.
    10·1 answer
  • Anna's computer has slowed down. How might she improve her computer's performance?
    6·1 answer
  • DRU is a small brokerage house that enables its clients to buy and sell stocks over the Internet, as well as place traditional o
    14·1 answer
  • 1. Write the syntax of the following HTML commands by using any one attribute
    6·2 answers
  • Question 1
    10·1 answer
  • 9. Differentiate between bolding and highlighting<br>text.<br>(2 marks)​
    15·2 answers
  • In what tab can a user find the workspace option?
    8·1 answer
  • Original documents or objects used during Internet research are known as
    8·2 answers
  • A student wrote a song. Another student posted a video of the song on You Tube, claiming to have written the song. This is most
    15·1 answer
  • 20
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!