1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
2 years ago
11

Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option t

o keep mail messages on the server
Computers and Technology
1 answer:
Alexxandr [17]2 years ago
5 0

IMAP  protocols is used by an email client to retrieve messages from an email server, giving users the option to keep mail messages on the server.

<h3>What is IMAP on one's email account?</h3>

IMAP is a term that connote Internet Message Access Protocol. IMAP helps one to be able to access the same inbox from a lot of devices.

Hence, IMAP  protocols is used by an email client to retrieve messages from an email server, giving users the option to keep mail messages on the server.

Learn more about email server from

brainly.com/question/15710969

#SPJ1

You might be interested in
Which statement is true of arrays? A) Array elements cannot be reset after the array is declared. B) Only whole numbers can be s
vekshin1

Answer:  Option (D) is correct

Explanation:

Array subscripts are used for refereeing to a individual element in the array.It is created by subscript operator for naming it.It can define the value about location often element. Array subscript can contain whole numbers only.

  • Other options are incorrect because array can be reset,other number along with the whole numbers can get stored in array and it can take high execution time.
  • Thus, the correct option is option(D.)
7 0
4 years ago
What is pseudocode? O A way of describing a set of instructions in text form using plain english O A diagrammatic representation
Marat540 [252]

The definition of pseudocode is that; A: A way of describing a set of instructions in text form using plain English

<h3>What is Pseudocode? </h3>

In computer science, pseudocode is defined as a plain language description of the steps in an algorithm or another system.

Now, the way Pseudocode works is that it often makes use of structural conventions of a normal programming language to be utilized for human reading instead of machine reading.

Pseudocode usually omits details that are essential for machine understanding of the algorithm, such as variable declarations and language-specific code.

Read more about Pseudocode at; brainly.com/question/11623795

8 0
3 years ago
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
What role does modern technology play in globalization today?
lana [24]

<span>Advances in technology are one of the main reasons that globalization has escalated in the past decade. In information and communication technology, innovations have become smaller in size, more efficient and often more affordable. In transport technology, vehicles have tended to become larger and faster, as well as becoming more environmentally friendly and cheaper to run. Whether for personal use or for business, technology has made the world seem a smaller place and assisted in the rise of globalization. </span>
6 0
3 years ago
Create a program that can be used to add two integers together. In the beginning, the user is asked to give two integers that ar
Gnesinka [82]

Answer:

Answer written in python.

Explanation:

#ask user for the first integer.

first_number = int(input("enter first number: "))

#ask user for the second integer

second_number = int(input("enter second number: "))

#add both and store in a variable, result.

result = first_number + second_number

#print out the result

print ( f"the answer to the problem is {result} calculated by adding {first_number} to {second_number}")

The worded lines after the # sign are called comments and are used to describe what the following lines of code does making it easier to read and understand by other programmers or by the same programmer coming back to it after a while.

3 0
3 years ago
Other questions:
  • Section: Friction
    10·1 answer
  • True or false. Embedding only part of a font is called presetting.
    14·1 answer
  • The chip that controls the radio frequency waves within a device
    9·1 answer
  • What is the difference between word processing software and email?
    12·2 answers
  • 12. ______ is considered to be the first video game mascot.
    7·1 answer
  • How many months have 28 days?
    8·1 answer
  • This isn't academic, but what do I do if HI-REZ won't let me sign into an existing account. “Something went wrong” keeps popping
    5·1 answer
  • Please helpppppppppp​
    8·1 answer
  • What does input allow a computer to do
    14·1 answer
  • What information most likely presents a security risk on your personal
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!