1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetach [21]
3 years ago
8

What does the e in email stand for

Computers and Technology
2 answers:
AysviL [449]3 years ago
5 0
Electronic means from one computer to another 
Alisiya [41]3 years ago
3 0
It stands for electronic. Email = electronic mail.
You might be interested in
The CEO, calls you into her office and tells you that she's learned that the company needs a database to keep track of supplier
k0ka [10]
The database has been a very unique way to park in
7 0
3 years ago
The Leal button is located in the
Fed [463]
The button is located on the left side of the gear shift right under the main shift button
7 0
3 years ago
Write a Java program that accepts an integer number from the user between 20 and 100. Next, divide the number by 12 and determin
Eddi Din [679]
Import java.util.Scanner;
class hola
{
public static void main(String[]args)
{
Scanner x=new Scanner(System.in);
int a=x.nextInt();
int b;
if(a>20&&a<100)
{
b=a%12;
if(b%2==0){
System.out.print("es par"+b);
}
else{
System.out.print("es impar"+b);
}
}
}

}
4 0
4 years ago
Juan Garcia is the network administrator for a small company that also maintains its own web server. He has taken the following
Lesechka [4]

Answer:

Yes Juan has done enough to secure the network

Explanation:

All the computers are patched, have antivirus software, and have unneeded services shut down - this is done to prevent malware from residing in the system.

The network has a firewall with proxy server and IDS - the firewall limit access to network so as to limit intrusion into the network

The organization has a policy requiring passwords of ten characters in length, and must be changed every 90 days - this is done to prevent leakage of sensitive information in the network especially when there is a compromise in the network.

4 0
4 years ago
Information dashboards enable ________ operations that allow the users to view underlying data sources and obtain more detail.
Alja [10]

I believe what you meant is Performance Dashboard and the correct answer is drill-down/drill-through

Prοvidе visual displays οf impοrtant infοrmatiοn that is cοnsοlidatеd and arrangеd οn a singlе scrееn sο infο can bе digеstеd at a singlе glancе.

4 0
3 years ago
Other questions:
  • Which of the following should NOT be done to keep people from slipping on floors? A) Have the proper absorbents in an easy-to-fi
    12·2 answers
  • To what would you compare the transport layer?
    14·1 answer
  • The font color grid is located in the color group on the design tab. (points : 2) true false
    9·1 answer
  • True or False. A compact disc (CD) stores music in a coded pattern of tiny pits 10−7m deep. The pits are arranged in a track tha
    9·1 answer
  • Which type of operating system is usually used in personal computers
    13·1 answer
  • How can websites illustrate cooperation and kindness?
    8·2 answers
  • Can someone write a 5 sentence summary about Virtual Assistants. Please. I'm in a rush. Personal problems.
    5·1 answer
  • Answer This One Question Right For Brainliest
    10·1 answer
  • [C++] 4.17 LAB: Print string in reverse Write a program that takes in a line of text as input, and outputs that line of text in
    8·1 answer
  • A programmer wants to determine whether a score is within 10 points of a given target. For example, if the target is 50, then th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!