1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka2103 [35]
3 years ago
11

Which of the following statements is true regarding the e-mails that were collected from Marina and Rita's Cupcakes' key employe

es? The e-mails were password protected and unable to be read. The e-mails included very little useful information. The e-mails included only personal information such as information about relationships and gossip. The e-mails included both professional and personal information that could be exploited.
Computers and Technology
1 answer:
Anarel [89]3 years ago
6 0

Answer:

The e-mails included both professional and personal information that could be exploited.

You might be interested in
In 5-10 sentences, describe the procedure for responding to an e-mail message.
miss Akunina [59]

Answer: See explanation

Explanation:

The procedure fur responding to an email message goes thus:

The first thing to do is to open the website of the email. Then, you would click on "compose".

When you click on compose, you'll see some space where you'll fill some information such as the email of the person that you're sending to, that is, the receiver. You'll also feel the subject of the email.

Then you type the content of your message. When you're done with this, then you click on send.

7 0
2 years ago
Five year ago, Amit was three times as old as Arman. Ten years later Amit would be twice as old as Arman. How old is Arman now? 
RideAnS [48]
Answer: 50
Explanation: let amit's current age = a and armaan's current age be b.
(a-5) = 3* (b-5)
i.e. a= 3b-10 -(i)
10 years later,
(a+10) = 2(b+10)
i.e. a=2b+10 -(ii)
From eqn (i) and (ii),
b=20,
and a=50
8 0
2 years ago
Read 2 more answers
When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack"
kumpel [21]

<em>The answer is : He must consult with a lawyer. </em>

<em>Hacking is considered illegal and in other countries, it is punishable by law. Hacking is gaining unauthorized access to a network. Even when someone is giving you permission to do it, it is still wrong and illegal. Therefore, you must know of your rights and make all the party involved to signed an agreement to save yourself.</em>

8 0
3 years ago
Double bar graphs compare multiple what
GalinKa [24]
You would multiply by 2
7 0
3 years ago
How do you implement instruction level parallelism
netineya [11]

Answer:

To obtain substantial performance enhancements, we must exploit ILP across multiple basic blocks.

Explanation:

8 0
3 years ago
Other questions:
  • Hudson has to maintain confidential college data in a workbook. He needs two team members to help him update data in the specifi
    7·2 answers
  • Lisa managed incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
    9·1 answer
  • Besides the Computer Inventory and Maintenance form, what other documentation should you keep on each computer? How might you st
    8·1 answer
  • As the network engineer, you are asked to design an IP subnet plan that calls for three subnets. The largest subnet needs a mini
    14·1 answer
  • If I wished to insert a hyperlink from text in my document to my company website, what type of link would I insert?
    9·1 answer
  • Difference between positional and non positional number​
    12·1 answer
  • 3.
    12·1 answer
  • What is text formatting?​
    5·2 answers
  • What is a possible weakness of an expert-novice pair?
    9·1 answer
  • 4. The volume of a sphere is (4.0/3.0)rr3 and the surface area is 4.0rr2, where r is the radius of
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!