1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AVprozaik [17]
3 years ago
10

How did Federal Express use the Internet to promote their image as service providers?

Computers and Technology
1 answer:
olga55 [171]3 years ago
3 0
To get the word around so more people would know about them
You might be interested in
______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
Kitty [74]

Answer:

"IP security" is the correct answer for the above question.

Explanation:

  • "IP security" is a set of rules or protocols which are used for the communication of the network.
  • It is a protocol that is used to encrypt the data which is needed to transfer on the network.
  • It provides security for the communication and it encrypts the data which is needs o transfer on the network.
  • The above question asked about the term which is used for encryption and security. So the answer is "IP security", which is defined above.
7 0
4 years ago
Read 2 more answers
Question 1
Ivanshal [37]

Answer:

Q1. B

Q2. D

Explanation:

3 0
2 years ago
Read 2 more answers
Advantages of email over traditional mail​
dalvyx [7]

Answer: emails are delivers very fast compared to regular traditional mail

Explanation:

6 0
1 year ago
What is troubleshooting?
Arisa [49]
Finding and fixing a problem
6 0
3 years ago
Read 2 more answers
In terms of their eligibility for legal protection, how do ideas differ from song lyrics?
4vir4ik [10]

Answer:

D

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • Based on the relational model, create the database metadata as part the physical designphase.b)from the metadata, write the sql
    10·1 answer
  • Hardware- The ______________ equipment that makes up the computer.
    6·1 answer
  • A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.
    13·1 answer
  • ____ are systems in which queues of objects are waiting to be served by various servers
    5·1 answer
  • Why are fixed resistors’ values indicated by color bands rather than printing the numeric value on their exterior?
    13·1 answer
  • Which type of computer network ensures high quality​
    9·1 answer
  • Which category of management information systems (MIS) combines the forecasting capability of decision support software with the
    12·1 answer
  • Which of the following statements is true?
    8·2 answers
  • A deluxe meal, represented by a DeluxeMeal object, includes a side dish and a drink for an additional cost of $3. The DeluxeMeal
    14·1 answer
  • For what three media types can Photoshop optimize images? ​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!