1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rzqust [24]
4 years ago
14

Which of these is NOT one of the main parts of an email?

Computers and Technology
2 answers:
svlad2 [7]4 years ago
8 0
The answer is reply, because a reply is a separate email in itself not a main part of an email. <span />
slega [8]4 years ago
3 0
I think the answer is c
You might be interested in
"Why learning how to type is so important.
djverab [1.8K]
The productivity of a business depends on how things are done faster. To complete your work faster it is important to develop typing skills. Typing helps you to work comfortably on the computer, it aids in communicating with colleagues and customers, creating documents, and finding new information.
Hopefully this helped.
8 0
3 years ago
Keyword stuffing is considered to be a black hat technique for SEO and is highly suggested today by Google.
klemol [59]

Answer:

False

Explanation:

Keyword stuffing is a practice to insert an unusual large number of tag in a website to increase the page ranking in search results. This is considered an unethical Search Engine Optimization (SEO).

Google consider Keyword stuffing as unethical and it doesn't help to boost the rank of a website. More advanced algorithms are being used to filter those of the meta tags which are irrelevant or excessively out of context in a website.

3 0
3 years ago
A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such
finlep [7]

Answer:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms.

Explanation:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms. Where a Rootkit provides features like remote access to users, it also opens ways for attackers. It helps in hiding the malicious software. Rootkits can be installed on the victim systems by phishing attack or social engineering techniques ..

6 0
3 years ago
Assume the following two classes as Person and Working: class Person { int personID, age; String fName, middleName, lastName; ..
Troyanec [42]

Answer:

A)

This is an example of tight coupling since the class Working has to have an idea of how Person is implemented to complete its own implementation.

B)

Any change in the Person class would require a change in the working class too.

C)

CODE

class Person {

int personID, age;

String fName, middleName, lastName;

public int getAge() {

return age;

}

}

// end of Person class

class Working extends Person {

boolean isUnderEighteen() {

if (super.getAge() <18) {

System.out.println("The person is under age and cannot work");

return true;

}

else {

System.out.println("The person can legitimately work");

return false;

}

}

}

Explanation:

4 0
4 years ago
Task manager is showing an application as “not responding.” what can you do?
34kurt
I think it's b because "end application" would make the most sence
8 0
3 years ago
Other questions:
  • ______ devices are high-performance storage servers that are individually connected to a network to provide storage for the comp
    5·1 answer
  • ____ is the official web portal for the U.S. government, providing access to all official U.S. government services and informati
    12·1 answer
  • How would you describe the relationship between blocks of code and commands?<br>HELP​
    10·1 answer
  • In black and white,<br><br> we must be more conscious of image
    11·1 answer
  • 4. When the keyword ____________________ is followed by a parenthesis, it indicates a call to the superclass constructor.
    13·1 answer
  • Which of the following tools enables a production mixer to sync audio and video?
    7·1 answer
  • What department is cyber security
    6·2 answers
  • Give at least five (5) practices that you must observe in your classroom.​
    13·2 answers
  • Write a program that repeatedly shows the user a menu to select the shape form three main shapes or to print the shapes created
    15·1 answer
  • You're making great progress on your assignment. You've defined the purpose of your message, identified both the primary and sec
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!