1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
murzikaleks [220]
3 years ago
12

When you have an e-mail message to send to several people, where is the best place to find their e-mail addresses? the Bcc field

the From field the subject line the address book
Computers and Technology
2 answers:
Effectus [21]3 years ago
8 0

Answer:

i'd say "Address book"

Explanation:

stich3 [128]3 years ago
6 0

you can find them in the Bcc field if you have sent them an email before or if they are registered in you address book then they will be there as well

You might be interested in
Should the use of hacktivists by a country against enemy organizations be considered an act of war? Why or why not? How about th
Artyom0805 [142]

Explanation:

Hacktivist comes from the combination of two words --- "Hack" and " Activism" .

Hacktivist perform hacktivism that means they make use of technology and knowledge to support as well as promote the political agenda and any kind of change in the social event.

Cyberterrorism, on the other hand uses internet and technology and conduct terrorism and other anti national activities like to coerce the societies or the governments in pursuit of their goals which are  religious, ideological or political.

While Hacktivism is used for a political cause, and is done in a peaceful manner; whereas cyber terrorism tries to grab the attention of the public through their aggressive ways, specifically by putting fear among the public.

But there is no instance of any person of getting killed by a cyber-attack or cyber terrorism. The larger damage is however done by those viruses or malware which gets into other persons computers or enemy organization computer system and weakens them and steals information and data. They damage and harm the economy in a larger scale.

When Chinese government first introduced the Trojan virus on the computer systems of their opponents abroad, is that can be called as Hacktivism? In  essence, this act may be called as cyber terrorism and not hacktivism. Because the Chinese Government intend to cause major economic damage and harm to their opponents or enemy organization by targeting the software giants in the West.

These companies crashed and and many left jobless and unemployment, they caused economic problems and damage to the technologies.  However, the Chinese Government's perspective on this is that they addresses such a thing as hacktivism as it advocates the state censorship by filtering the politically or the socially-unacceptable ideas in their e-mail.

Thus, the answer is relative as to whose perspective we are looking. Either we are taking the perspective of the Chinese government or that of the enemy organization which is affected by the act of the state censorship and targeting the Western software giants.

Cyberterrorism will somehow become a serious threat to the society when people adept at hacking will sympathize and also align with terrorists activities and cause. It has become appealing since some of computer programs have the features that are easily exploited and conducive for committing cyber terrorism.

3 0
3 years ago
A large retail company hires several new joiners and would like to incorporate Virtual Reality (VR) into their onboarding proces
LuckyWell [14K]

VR training can be used effective recruitment and onboarding of staffs within an organization.

Virtual reality (VR)

Virtual reality (VR) makes practical training sessions much easier and effective.

VR training can be used effective recruitment and onboarding of staffs within an organization. VR helps companies to virtually induct employees to the process and the common challenges that can be faced in a job.

Find out more on Virtual reality (VR) at: brainly.com/question/26462832

3 0
3 years ago
Jack is part of the software quality assurance team in a company. Which activity should Jack perform as a part of software quali
gizmo_the_mogwai [7]

Answer:

C - testing

Explanation:

quality assurance is another name for verifying something. so when you verify software, you test the software.

3 0
3 years ago
Graphics that contain movement are often referred to as<br>..........​
Jlenok [28]

Answer:

I think the answer is animation.

7 0
3 years ago
Read 2 more answers
The process where the programmer steps through each of the program's statements one by one is called
viva [34]

The process where the programmer steps through each of the program's statements one by one is called \sf\purple{hand \:tracing}.

\bold{ \green{ \star{ \orange{Mystique35}}}}⋆

5 0
4 years ago
Other questions:
  • Write a function (named n_pointed_star) to make the turtle draw an n-pointed star. The function should return nothing, and accep
    10·1 answer
  • What does it mean for a school to be “accredited”?
    5·1 answer
  • The ____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requir
    8·1 answer
  • If you can log into a website to add, edit, or delete content that has been added by you or another user, you are most likely us
    6·1 answer
  • The university computer lab’s director keeps track of lab usage, as measured by the number of students using the lab. This funct
    11·1 answer
  • A feature that displays in the lower right corner of a selected range with which you can analyze your data by using Excel tools
    12·2 answers
  • Information about a computer file, not the actual data that is contained in the file, is called ______
    8·2 answers
  • True or False: Wikipedia is a reliable source. ​
    5·2 answers
  • What new information, strategies, or techniques have you learned that will increase your technology skills?
    14·1 answer
  • What are the values of a[k] and a[k+1] after code corresponding to the following pseudocode runs?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!