1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena L [17]
3 years ago
6

Host B is sending an email intended for the user on Host A to the email server. What protocol is being used to send the message

through the router?
Computers and Technology
1 answer:
Lynna [10]3 years ago
6 0

Answer:

I think that part A is correct option

You might be interested in
What is the benefit of a cloud computing infrastructure? ○ Companies have full control over the data that is hosted. ○ Companies
Volgvan
Most valuable reason for a company to switch to cloud computing is that they only have to pay for the resources they use, and since everything is being host by another company there is no need for internal host of application on private servers and cloud computing has top of the line security since they hire the best IT admin(s)
7 0
3 years ago
In this exercise, you are given a word or phrase and you need to return that word or phrase with the word ‘like’ in front of it.
bogdanovich [222]

Answer:

See the link

Explanation:

There's exact same question on Brainly

brainly.com/question/15797916

7 0
3 years ago
Why can’t I message people? It doesn’t let me, please help.
Rudiy27

Answer:

they let that texting stuff go a year ago so now its just sitting there

Explanation:

6 0
3 years ago
Read 2 more answers
Can you please look through this code and see wants wrong with it? its in python
Ivanshal [37]
I’m confused what are you trying to ask? What is the python?
3 0
3 years ago
Most of the Desktop games contain a backdoor used to test and update the game.
sveta [45]

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer" —a tiny computer-within-a-computer such as that found in Intel's AMT technology).Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems. From there it may be used to gain access to privileged information like passwords, corrupt or delete data on hard drives, or transfer information within autoschediastic networks.

the answer is True

i hope it will help you

8 0
3 years ago
Other questions:
  • What are some situations where you might find it useful to use the “!” symbol in a program?
    9·1 answer
  • Peter has a website that promotes his local vacation rental site. He uses Google Ads to manage his advertising campaign. He’s cr
    13·1 answer
  • Diane is receiving a lot of unwanted e-mail. What steps can she take to reduce the amount of e-mail she receives?
    12·1 answer
  • Select the correct answer.
    11·1 answer
  • Write a program that lets the user enter a nonnegative integer then uses a loop to calculate the factorial of that number. Displ
    11·1 answer
  • "Which of the following is not an example of a project? Select one: a. Creating a website for a company b. Raising money for a d
    5·1 answer
  • This code --> plt.plot(x,y) is used to draw :
    8·1 answer
  • Can someone take away your points
    15·1 answer
  • Fill in the blanks <br>a) an _______________ checks the files on the computer for viruses.​
    6·2 answers
  • Question 1 (1 point)
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!