1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novosadov [1.4K]
3 years ago
5

What e-mail protocol does Marina and Rita’s Cupcakes use and why is it important?

Computers and Technology
1 answer:
Taya2010 [7]3 years ago
8 0

Marina and Rita’s Cupcakes use the IMAP email protocol. It is important since it stores copies of all the emails stored on the server.

 

To add, IMAP<span> (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages,</span>

You might be interested in
What do mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud co
Anuta_ua [19.1K]

Answer:

4G/5G.

Explanation:

The broadband cellular network technology that mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud computing, high-definition mobile TV, and mobile 3-D TV is 4G/5G.

4G technology refers to the fourth generation broadband cellular network technology that is typically used for cellular communications on mobile phones and it is considered to have an internet speed that is ten times faster than what is obtainable on the third generation (3G) broadband technology.

Similarly, 5G is the fifth generation broadband cellular network technology that succeeded 4G and it offers higher quality in terms of performance, reliability, availability and efficiency.

As a result of the speed and high quality specifications of the 4G/5G broadband cellular network technology, they are widely used for various communications systems.

5 0
3 years ago
What is a browser? Give one example
Harman [31]
It is a program that may be used by a user to access files and navigate the World Wide Web. An example of this would be Firefox, Chrome, Safari, etc.
3 0
3 years ago
Read 2 more answers
I can't find my grandson someone help
Artemon [7]

Answer:

i'm right here

Explanation:

grandma

8 0
2 years ago
Read 2 more answers
How to make your nest learning thermostat stop doing something
k0ka [10]

Answer:

You could unplug it? LOL

and get a different thermostat.

Explanation:

Could you mark this answer as brainiest?

Thanks! :)

4 0
3 years ago
Write two separate formulas using different commands that concatenate " john and "smith" together to form " John Smith"
VladimirAG [237]

Answer:

1. =CONCATENATE(" John"," ","Smith")

2. =(" John"&" "&"Smith")

Explanation:

Given

Two separate strings; "John" and "Smith"

Required

2 separate formulas to concatenate both strings to form " John Smith"

There are several ways to concatenate strings in Microsoft Office Excel; one of the methods is using the concatenate function while the another method is using the traditional & operator.

Using the concatenate function, the formula is as follows

=CONCATENATE(" John"," ","Smith")

This function will combine the " John", " " and "Smith" to give a new string " John Smith" (without the quotes).

Using the traditional & operator may be a little bit difficult (and not frequently used) but the formula is as follows;

=(" John"&" "&"Smith")

The result will be the same as (1) above

5 0
3 years ago
Other questions:
  • Victoria enjoys laughing with her friends as they walk around the track after school. Which best describes her hate rate during
    5·1 answer
  • In this exercise, you are given a phrase and need to return that phrase in all capital letters.
    6·1 answer
  • A key field is used to _____. enter a password uniquely identify records merge data list the most important information
    12·2 answers
  • Many organizations find themselves in the position of being data rich and information poor. Even in today's electronic world, ma
    13·1 answer
  • Which network media uses different regions of the electromagnetic spectrum to transmit signals through air?
    13·1 answer
  • Is it possible to have a deadlock involving only oneprocess? Explain your answer.
    11·1 answer
  • What are the benefits of building redundancy into a network?
    12·1 answer
  • several ways that we commonly use technology today that people couldn't 10 years ago. Are these uses helpful or harmful to socie
    9·1 answer
  • Which feature is not in ms PowerPoint​
    12·1 answer
  • Select one Layer 2 or wireless WAN technology presented in Lesson 3. Elaborate on its characteristics, pros and cons, and common
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!