1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vazorg [7]
3 years ago
6

Donna often travels around the world. When she travels, she needs to access her emails from different locations. However, to kee

p her luggage light, she does not carry her laptop. Which email program can Donna use?
A. Firefox Mozilla’s Thunderbird
B. Yahoo! Mail
C. Microsoft Outlook Express
D. Apple Mail
Computers and Technology
2 answers:
juin [17]3 years ago
6 0

The answer is B: Yahoo! mail

Donna is able to install Yahoo! mail as an app on her portable devices like phones and tablets and be able to organize her Google mails, Outlook, and yahoo accounts. The beauty of it is that you are able to sign in with any account (non-Yahoo emails). anywhere and at any time. It also provides 1000 GB of free secure cloud storage.



miv72 [106K]3 years ago
4 0
Donna can use (B) yahoo mail

You might be interested in
How does a router differ from such devices as repeaters, bridges, and switches?
irina1246 [14]

Answer: Please see below as the answer is self-explanatory

Explanation:

Repeaters, bridges and switches, route packets only within the limits of  their own physical networks, using the physical hardware addresses of the different devices connected to the network.

On the contrary, routers are devices that interconnect physical networks, with one physical interface per each network to which the router is connected to.

Routers use logical addresses -called IP addresses in the TCP/IP suite, which operate at the network level, and take charge of the delivery of packets beyond the network that originated it, based on the IP address of the destination host.

Only when the IP destination address is within the same physical network as the router, it transforms the IP datagram in a Frame and sends it using the physical hardware address of the host.

8 0
3 years ago
Which of the following statements is false?
Sergio039 [100]

Answer:

Option (d)

Explanation:

Option (a) the return type of the method specifies the type of the data that is returned for the method calling. The return type can be void if it doesn't return any value. The method return can be int, string and bool etc. So, option (a) is true and it not the correct option.

Option (b) is true it doesn't need any parameters. So, option (b) is not the correct option.

Option (c) is true. If the method has some return type other than void it must return something according to the return type.So, option (c) is not the correct option.

Option (d) is false. Getters and setters methods are used for accessing private variables but the name MUST start with get or set is false. The best practice is to start with get and set but it is NOT a must.

So, option (d) is correct option.

6 0
3 years ago
For an external usb hard drive attached to a computer, which is more suitable: a writethrough cache or a block cache
Charra [1.4K]

Disk access is way slower than memory access. Caching is a technique to improve the disk access time.  Block cache is a caching technique which reduces disk accesses time.  Here a portion of disk is bought to cache for reading and a modified blocks are first changed in cache but reflected in the disk at one go.  On the other hand with write through caching each modified block is written to cache and at the same time it is written to the disk.  Write- through caching requires more disk I/O so they can have a negative effect on the performance. 

6 0
3 years ago
Read 2 more answers
A quick boot allows you to do what?
WITCHER [35]
Access the BIOS setup
6 0
3 years ago
Read 2 more answers
How many discussion posts must you complete to meet the Expectations of the replies category
Dennis_Churaev [7]

Answer:

I want to take this time to discuss a few expectations and helpful information about how to participate in the weekly online discussions. You can scroll down the page or use the links here to navigate to each section.  All Discussions can be found by clicking on the Discussions link located on the left-hand side of the course.

Explanation:

Participation in the discussion forums is critical for maximizing student learning in this course, both because your participation is graded and because it's a chance to engage in a dialogue about course material.  In this course, students are required to be a part of an online community of learners who collectively interact, through discussion, to enhance and support the professional performance of each other. Part of the assessment criteria for the course includes evaluating the quality and quantity of your participation in the discussion forum.

The TAS will facilitate student discussions, although they likely will not address every single post. In most cases, they might share a related idea, intervene when the discussion goes off-track, or tie student comments together to help deepen student learning.  Remember, if you have a specific question, pose

3 0
3 years ago
Other questions:
  • What is a function library?
    11·1 answer
  • Encryption is the process of:
    12·1 answer
  • What's the 16-bit hexadecimal representation of the signed decimal integer, -331? Answeers?
    14·1 answer
  • Why is it important to use proper line types
    13·1 answer
  • A light or optical microscope most commonly used is called a(n) _____. bright-field microscope dark-field microscope electron mi
    8·2 answers
  • Is anyone else having issues with brainly not working? Everytime I click on a answer it only comes up with the 7 month trail thi
    12·1 answer
  • How would you want to change the copyright laws?
    11·1 answer
  • Which of the following statements about ip addresses is true?
    5·1 answer
  • What is the launching of a 3-D map called?
    12·1 answer
  • In how many positions are there nucleotide differences between your query sequence and the sequence of accession AY259214.1
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!