So they can know who it is going to . You cannot send an email without knowing who it goes to :)
This is not a computer and technology question but ill still answer it!! They are not
Answer:
restart computer,check to see who was last on her account or call a technician
Explanation:
Hello <span>August1859
</span>
Answer: In a database, a key field is used to uniquely identify each record for retrieval or manipulation.
Hope This Helps!
-Chris
Answer:
UDP Port 69
<em>Trivial file transfer protocol (TFTP) operates over UDP port 69.</em>
Explanation:
UDP port 69 uses the Datagram Protocol, a communications protocol for the Internet network layer, transport layer, and session layer. This protocol when used over PORT 69 makes possible the transmission of a datagram message from one computer to an application running in another computer. UDP is used with <em>IP (the Internet Protocol)</em> and UDP Port 69 is <em>connectionless </em>which means it does not give reliable communication; it’s up to the application that received the message on Port 69 to process any errors and verify correct delivery.