1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
coldgirl [10]
4 years ago
7

In a typical e-mail address, what is the "host"? A. an account designated by a user name. B. the computer that houses an Interne

t connection. C. the receiver of an e-mail message. D. CPU processor 2500
Computers and Technology
1 answer:
goldenfox [79]4 years ago
7 0
In a typical email address, A host is an acount designated by a user name. Hosts are the senders of the email that are to be sent to the receiver. Also letter b of the choices is another factor needed to be a host. A is the correct answer and all the other choices are wrong.
You might be interested in
A data classification scheme is a formal access control methodology used to assign a level of availability to an information ass
photoshop1234 [79]

A data classification scheme is a formal access control methodology used to assign a level of availability to an information asset and thus restrict the number of people who can access is a FALSE statement.

Explanation :

  • The statemant given above will lead to a loss of confidentiality, hence it is false.
  • A loss of confidentiality is the unauthorized disclosure of information.
  • If a system suffers loss of confidentiality, then data has been disclosed to unauthorized individuals. This could be high level secret or proprietary data, or simply data that someone wasn't authorized to see

3 0
4 years ago
In the scene where we see Don and Lina acting in a silent film (beginning at time code 11:05), describe the silent film. How is
asambeis [7]
Well, it was black and white…and it was silent. That's a lot different from today because we have surround sound, color TV, 3D/4D etc.

(I wish there was more to go on, but from time code 11:05 it only lasted for a few seconds. Hope this helps!)

4 0
4 years ago
A decision making body that considers system requests and makes the initial determination of whether to investigate the proposal
aev [14]

Answer: Approval

Explanation:

Most of the organisations have a approval committee, with the main objective of taking decisions. Whenever a new proposal for a project or a new system is to be adopted to the organisation it is necessary to go through certain procedures to be approved. The approval committee has the distinguished members of different fields they take the matter and if they are convinced then it considers the matters for its approval.

3 0
4 years ago
A network administrator is using packet tracer to mock up a network that includes iot devices. What can the administrator do fro
Vikki [24]

Answer:

give some instructions for iot device

Explanation:

on how to go about something that you would be able to control physically

6 0
3 years ago
What should a good interface delight incorporate?
antoniya [11.8K]

<u>Answer:</u>  

A) a very long but detailed menu system

<u>Explanation:</u>

A <em>detailed menu will never attract or support the user in any form</em>. It might be difficult to use the application for longer time due to the <em>un supportive menu format.</em>

Option B: This option might look closer to the answer but it might not attract if many users are unaware of the latest changes.

Option C: The application should support and should not challenge the user. It is not a quiz or game show to challenge people.

Option D: Any GUI should be attractive so that the user tend to use it frequently.

8 0
3 years ago
Other questions:
  • Visual images taken directly from a source, such as pictures, charts, and graphs do not need a citation. true or false.
    8·1 answer
  • In two to three sentences, describe how you would move a file.
    6·1 answer
  • The purpose of validating the results of the program is Group of answer choices To create a model of the program To determine if
    12·1 answer
  • A user who enters americanbank.net into a web browser instead of the correct americanbank and is then taken to a fake look-alike
    11·2 answers
  • The system cannot contact a domain controller to service the authentication request
    8·1 answer
  • For functional programming languages, the scope of a local name Group of answer choices is always the entire program. starts imm
    12·1 answer
  • Why do some people have random numbers as their usernames?
    9·2 answers
  • A USB flash drive is a data storage device that includes flash memory with an integrated USB interface. It is typically removabl
    7·1 answer
  • Legends are titles given to three-axis X, Y, and Z-axis. True or false?
    6·1 answer
  • The specialized programs used by the operating systems to help ensure that memory is used properly and there are no memory confl
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!