1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrezito [222]
3 years ago
13

In an email, above subject, what does cc mean?

Computers and Technology
1 answer:
IRISSAK [1]3 years ago
7 0
It stands for carbon copy.
You might be interested in
a. Do you think the U.S. government should censor information on the Web, such as instructions for making weapons, to protect th
MrRissso [65]

Answer:

The answer is YES.

Explanation:

<em>Things pertaining to weapons, destructive materials should be shared with precautions or much better if these things should not be put online. Since internet is widely available to almost all types of users and almost to all places, we cannot be sure of who will get hold of these information. Kids could easily see this and gain knowledge and out of curiosity will try these dangerous things. Terrorist groups will also have access to these information and who knows might happen to poor innocent souls around.  </em>

<em> </em>

<em>I don't think it would violate the right of First Amendment regarding freedom of speech. Freedom should be granted on matters that are most sensible. And this time, we are just protecting the rights of children and other innocent people who can be a victim including you. We are talking about weapons and destructive materials here which is non beneficial if one could get hold of this information, in my opinion. If there is really a need to construct these things, it is better to consult an expert or an authority to ensure that nobody gets harm.</em>  

5 0
3 years ago
Select all the ways in which business professionals might use a spreadsheet in their jobs.
Dahasolnce [82]

Answer:

By making calculation.

Explanation:

Because spreadsheet is a calculation type software.

4 0
3 years ago
Complete the sentence with the correct response.
Fiesta28 [93]

Answer:

Material systems developer typically combines the skills of a programmer with the multitasking expectations of developing 3 dimensional models of objects, enhancing the graphical effects.

6 0
3 years ago
Translate each of the following binary representations into its equivalent base ten representation.
Semenov [28]

Answer:

12, 2.375, 0.25, 17

Explanation:

A. 2^3 + 2^2 = 12

B. 2^1 + 2^-2 + 2^-3 = 2.375

C. 2^-2 = 0.25

D. 2^4 + 2^0 = 17

3 0
4 years ago
Which software package allows developers to deploy applications using the exact same environment in which they were developed?
Elanso [62]

The software that allows developers to deploy applications using the exact same environment in which they were developed is docker. The correct option is A.

<h3>What is a software package?</h3>

An assortment of files and data about those files makes up a software package. Linux's distributions are typically set up as individual software packages, each of which contains a specific program, like a web browser or a development environment.

Docker is a platform of service products that uses visualization of OS. Develops the shipping and running application.

Thus, the correct option is A. Docker.

To learn more about the software package, refer to the link:

brainly.com/question/18523054

#SPJ4

The question is incomplete. Your most probably complete question is given below:

A. Docker

B. Git

C. Bitbucket

D. Gitlab

6 0
2 years ago
Other questions:
  • All of the following are good reasons to attend a cummunity college except
    10·2 answers
  • Arcade games such as Donkey Kong, Mr. Dol, and Venture were adapted from arcade titles to home consoles by which company?
    9·2 answers
  • You accidentally moved your task bar from the bottom of the screen to the left side. You would like to
    14·2 answers
  • CODE EXAMPLE 3-1 SELECT vendorName, invoiceNumber, invoiceDate, invoiceTotal FROM vendors INNER JOIN invoices ON vendors .vendor
    13·1 answer
  • A _____ attack is designed to generate a lot of activity on a network by flooding it with useless trafficenough traffic to overw
    14·2 answers
  • Another name for the office button menu is the toolbar. true or false.
    7·2 answers
  • 1) List two hardware methods that can be used to secure data
    11·1 answer
  • 1) APPLICATION BASED QUESTION:-
    5·1 answer
  • If a machine cycle is 2 nanoseconds , how many machine cycles occur each second?
    7·1 answer
  • What are the chances of a baby zombie to spawn in full golden armor in MC? ​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!