1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
taurus [48]
2 years ago
9

What is the topic of the e-mail? what is the purpose of the e-mail?

Computers and Technology
1 answer:
const2013 [10]2 years ago
7 0

Answer:

What email are you talking about?

You might be interested in
What caused accident? into passive voice​
lozanna [386]
Accident was caused by what
6 0
3 years ago
Jenn wants to assign a value to the favorite car variable: favoriteCar = Toyota but gets an error message. What does she need to
Bumek [7]

Answer:

The correct answer is: Option d: Put Quotation marks around the string.

Explanation:

The names of things or places or cars are usually in the form of words or sentences. The words or sentences are stored in string datatype.

Quotation marks are used to deal with strings in programming languages.

Hence,

The correct answer is: Option d: Put Quotation marks around the string.

3 0
3 years ago
Combination of star topology and star topology can consider as hybrid?​
Ad libitum [116K]

Answer:

no

Explanation:

A hybrid topology is a type of network topology that uses two or more differing network topologies. These topologies can include a mix of bus topology, mesh topology, ring topology, star topology, and tree topology.

4 0
3 years ago
Which formal security-related process should take place at the beginning of the code creation project? Group of answer choices R
Igoryamba

Answer:

Risk assessment, Input validation and Output validation.

Explanation:

Software development life cycle, SDLC, is a systematic process a software being created must pass through or follow, from the stage of conception to death of the application.

There are various processes that occurs at the beginning of SDLC, a few of the activities are risk management, input and output validation.

Risk management is used to determine the feasibility, usefulness and profitability to cost of the software before development. The input and output validation is for security control access to the data of the software.

3 0
3 years ago
I am trying to test out the software Classroom relay and I am just ask if there is any way kids can stop Classroom relay form se
Ratling [72]

Answer:

just don't share your screen in the class or if your a teacher just call them out

Explanation:

8 0
2 years ago
Read 2 more answers
Other questions:
  • What type of elements are bridges exposed to yearly
    13·2 answers
  • A manager wants to set up an area that is not on the LAN but not quite on the Internet. This area will house servers that will s
    5·1 answer
  • 1 Explain the difference between using a computer program and programming a computer.
    12·1 answer
  • Terms that represents the achual speed used by device to transfer data​
    14·1 answer
  • Implement a java program to find the smallest distance between two neighbouring numbers in an array.
    7·1 answer
  • what term defines inventiveness uncertainty and futuristic ideas typically deals with science and technology
    15·1 answer
  • A single-user/single-tasking operating system allows only one user to perform one task at a time. A real-time operating system g
    13·1 answer
  • Genetics Vocabulary: no <br> Allele: Different versions of the same qene (Aa, Bb)
    11·1 answer
  • Is social media bringing people together or cause in sepretation?​
    11·2 answers
  • A license may limit the use of a software application to a specific device. Group of answer choices True False
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!