1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NNADVOKAT [17]
3 years ago
15

Full form of SMPT???

Computers and Technology
1 answer:
Anna11 [10]3 years ago
5 0

Answer:

Simple Mail Transfer Protocol (SMTP) is the standard protocol for sending emails across the Internet.

You might be interested in
What happens if you never confirm your facebook account?
OleMash [197]
Nothing, it will just keep sending you annoying notifications that become more and more frequent, i would just confirm it if i were you
5 0
3 years ago
What type of photography is represented by a photograph of a dog on a beach ?
yan [13]

Answer:

• portrait photography

• nature photography

Explanation:

First identifying the subject of the photograph. The image shows a dog on the beach, therefore the subject is the dog. Since the picture is of a dog, it represents what is known as ‘Pet Photography.’ This type of photography is part of several different categories in ‘Portrait Photography.’

Because the dog is on a beach, and a beach is a part of nature, the photograph also represents nature photography.

In conclusion, a photograph of a dog on a beach represents portrait photography and nature photography.

6 0
3 years ago
Write the definition of a function named isSorted that receives three arguments: an array of int , an int that indicates the num
vazorg [7]

Answer:

The method definition to this question can be given as:

Method Definition:

bool isSorted(int a[], int n, bool status)  //function definition

{

//function body

bool flag = true;          //define Bool(Boolean) variable.

if(status == true)  //check condition.

{

for (int i=0; i<n-1; i++)         //loop for search

{

if (a[i] > a[i+1])         //check array elements

{

flag = false;         //change bool variable value.

}

}

}

else       //else block

{

for (int i=n-1; i > 0; i--)  //loop

{

if (a[i] > a[i-1])   //if block

{

flag = false;     //change bool variable value.

}

}

}

return flag;      //return value.

}  

Explanation:

In the above method definition firstly we define the method that is isSorted(). This method returns true or false value because its return type is bool. In the method, we define the bool variable that is flag. Then we use the condition by using conditional statements. in the if block we check that if status equal to true then we use the for loop in the for loop we define variable i that is used for search array elements it will go to n-1 that is the total number of an array is decrement by 1. In this loop, we use the if condition that is if elements of a[i] is greater then a[i+1] flag will return false. In the else block we use the for loop for search array elements in this loop we use the if block that checks that elements of a[i] is greater then a[i-1]. if it is true it returns false. end of loop end of else block the function will return value.

4 0
3 years ago
Calculate the shear stress (lbf/in^2) for a given normal stress (lbf/in^2) that is applied to a material with a given cohesion (
LenaWriter [7]

MOHR-COULOMB FAILURE CRITERIA:

In 1900, MOHR-COULOMB states Theory of Rupture in Materials which defines as “A material fails due to because of a critical combination of normal and shear stress, not from maximum normal or shear stress”. Failure Envelope is approached by a linear relationship.

If you can not understand the below symbols see the attachment below

 f   f ()  

Where:      f = Shear Stress on Failure Plane  

       ´= Normal Stress on Failure Plane

 See the graph in the attachment

For calculating the shear stress, when Normal stress, cohesion and angle of internal friction are given. Use this formula:   shear stress =  f  c   tan 

Where,  

• f  is Shear Stress on Failure Plane

• c  is Cohesion

•  is Normal Total Stress on Failure Plane

•  is Friction Angle

8 0
4 years ago
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
3 years ago
Other questions:
  • How to put vibratuon when tapping on keyboard galaxy s3?
    5·1 answer
  • tls Explain in your own words how, by applying both asymmetric and symmetric encryption, your browser uses TLS to protect the pr
    8·1 answer
  • How do web bugs invade a person's privacy?
    7·1 answer
  • The spreadsheet below shows the age, grade level, major, and minor of four students in college. A purple background in the
    5·1 answer
  • our grandmother tells you a dollar doesn’t go as far as it used to. She says the “purchasing power” of a dollar is much less tha
    6·1 answer
  • X= [12,67,89,34,56,90,67]
    6·1 answer
  • What kind of charger can i use for this
    10·2 answers
  • Harry needs to make a presentation on packaging prototypes for a new product. Which presentation software elements can be use to
    9·1 answer
  • You are creating a program that can add up the amount of money the user spent that day. Right down to the penny! What kind of va
    12·2 answers
  • Identify the two top benefits of using angel investors to start a business.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!