1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataliya [291]
3 years ago
14

Write any four difference between email and effects​

Computers and Technology
1 answer:
iragen [17]3 years ago
8 0

Answer:

Email:

  1. Email is simple
  2. Email is free tool
  3. Email is quick
  4. Email allows for easy referencing
  5. email is accessible from anywhere

Effects:

  1. Email should be kept short and brief
  2. Email requires timely responses
  3. Email lacks personal touch
  4. Email messages can contain viruses
  5. Email can be disruptive
You might be interested in
Which of the following is an example of how the healthcare industry uses computer programming? (5 points)
IgorC [24]
3-D prosthetics would most likely be the answer, also, don’t copy links it’s most likely not the answer anyways.
5 0
2 years ago
Which is not a proper statement?
kodGreya [7K]

Answer:

leftisBlocked()

Explanation:

4 0
3 years ago
Read 2 more answers
A Chief Security Officer (CSO) has asked a technician to devise a solution that can detect unauthorized execution privileges fro
VikaD [51]

A solution which would best meet the CSO's requirements is: B. Sandboxing.

<h3>What is a sandbox?</h3>

A sandbox can be defined as an isolated environment in a computer system or on a network that is designed and developed to mimic end user operating system (OS) and environments, so as to detect unauthorized execution privileges from the operating system (OS).

In cybersecurity, sandboxing is typically used to safely execute suspicious code and data files without causing any harm to the host device or network. Also, sandboxing can work in conjunction with proxies or unified threat management (UTM).

Read more on sandboxing here: brainly.com/question/25883753

8 0
2 years ago
True/False: Before a computer can execute a program written in a high level language, such as C , it must be translated into obj
Alekssandra [29.7K]

Answer:

True

Explanation:

5 0
2 years ago
PLEASE HELP ASAP I WILL MARK AS BRILLIANT
Natali [406]
1) Irresponsible behavior.
2) Using a password-protected website and making sure only specific friends can see it.<span>
</span>3) Posting offensive pictures is disrespectful of the feelings of others.
4) Mark posts his e-mail address to gain access to a dozen online gambling sites.
6 0
3 years ago
Other questions:
  • What are the names of each devices pleaseee​
    13·2 answers
  • Robert's computer is not starting due to an error in the BIOS. Which of these chips could have malfunctioned? Select the correct
    12·1 answer
  • What are the first two lines of defense a company should take when addressing security risks?
    10·1 answer
  • Predict how digital video will be viewed in the future. Step into the year 2028. How are people viewing digital video? Or have w
    9·2 answers
  • MIDI is a A.technology based on placing brief digital recordings of live sounds under the control of a synthesizer keyboard. B.t
    10·1 answer
  • The monkey-and-bananas problem is faced by a monkey in a laboratory with some bananas hanging out of reach from the ceiling. A b
    8·1 answer
  • What is a flowchart and write it's work​
    13·1 answer
  • Write about virus in five points.​
    8·1 answer
  • A network device that is used to connect multiple devices together without segmenting a network is a __________.
    10·1 answer
  • What variation pairs a new employee with an employee who has been with the company for 20 years?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!