1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolbaska11 [484]
3 years ago
12

Why do we need to send emails

Computers and Technology
1 answer:
DiKsa [7]3 years ago
5 0

Answer:

email is the easier way of communicating and fast

You might be interested in
Give an example of at least one information system you know or have heard of.
Fantom [35]

Answer: A Gaming Console

6 0
3 years ago
Read 2 more answers
with a ____ the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segreg
GenaCL600 [577]

With option A: IDP the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segregates that traffic from other packets on the internet.

<h3>What in security is IdP?</h3>

A system that produces, maintains, and manages digital IDs is known as an identity provider (IdP). The IdP has two options for user authentication: directly through the user, or indirectly through third-party service providers (apps, websites, or other digital services). IdPs provide user authentication as a service, to put it simply.

Note that A system component known as an identity provider (IdP) gives an end user or internet-connected device a single set of login credentials that guarantee the entity is who or what it claims to be across several platforms, apps, and networks.

Learn more about An identity provider from

brainly.com/question/29024344
#SPJ1

6 0
1 year ago
Which type of storage disk and disk drive can you use in the given situation?
AfilCa [17]

I : DVD

II:DVD-R

A DVD-RW would work too.

3 0
3 years ago
What's is the contribution of technology to the country?
slamgirl [31]
To help us get news from different countries
8 0
3 years ago
Write a loop that reads positive integers from standard input and that terminates when it reads an integer that is not positive.
Paraphin [41]

Answer:

The program to this question as follows:

Program:

#defining variable and assign value

odd=0  

even=0  

i=1  

print('Input 0 after inserting all number: ') #print message

while i>0: #define loop for check inserting and add all number

   i=int(input()) #input value by user end

   if (i< 0): #check value is not positive

       break

   if ((i % 2)==0and(i>0)): #check even number condition

       even=even+i #add even numbers

   if ((i % 2)!=0and(i>0)): #check odd number condition

       odd=odd+i #add odd numbers

print ('Sum of Even number:',even,'and','Sum of Odd number:',odd) #print value

Output:

Input 0 after inserting all number:  

1

2

3

5

7

0

Sum of Even number: 2 and Sum of Odd number: 16

 Explanation:

In the above python program, three variable is defined, that is "even, odd and i", in which "even and odd" variable assign value that is "0", and the variable i is used for inserting elements from user. In the next line a while loop is defined that inserts numbers in variable "i", in this loop, 3 if block is used that can be defined as follows:

  • In first if block variable "i", checks that value is non-positive number if this condition is true, it will break the loop.
  • In second if block this block check even number condition and add in even variable.
  • In third, if block this block check odd number condition and add in odd variable.  

End of the loop we use print function that prints the sum of even numbers and odd numbers.

3 0
3 years ago
Other questions:
  • Lance has three tables in his database he wants to generate a report to show the data from the three table so he decides to link
    6·2 answers
  • In the lan protocol architecture the _________ layer is responsible for detecting errors and discarding any frames that are in e
    13·1 answer
  • What is the difference between primary storage,secondary storage and offline storage what type of storage can be
    6·2 answers
  • A method that receives a two-dimensional array uses two ____ pairs following the data type in the parameter list of the method h
    11·1 answer
  • Design and implement an application that reads a sequence of up to 25 pairs of names and postal (ZIP) codes for individuals. Sto
    9·1 answer
  • True or False? In a C++ floating-point constant, a decimal point is not required if exponential (E) notation is used
    13·1 answer
  • What is the full form of icimod?
    6·1 answer
  • How do the principles behind the Agile Manifesto suggest approaching architecture?A. Architecture emergesB. Architecture is not
    10·1 answer
  • Which is not one of the four criteria for proving the correctness of a logical pretest loop construct of the form: while B do S
    14·1 answer
  • In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be co
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!