1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleks04 [339]
3 years ago
7

Select the correct answer. Adrian sent his manager Stacy an email message that required her immediate attention. Stacy was unabl

e to access her emails due to a network problem. Which problem of email communication does this scenario represent? A. invasion of privacy B. lack of security C. real-time communication problem D. misinterpretation
Computers and Technology
2 answers:
zaharov [31]3 years ago
7 0
B. Lack of security
Sergio [31]3 years ago
5 0

I believe the answer is C) Real-time answer but it also could be D) Misinterpretation

You might be interested in
A digital camera is an_____​
garik1379 [7]

ITS ABOUT DRIVE

ITS ABOUT POWER

WE STAY HUNGRY

WE DEVOUR

PUT IN THE WORK

PUT IN THE HOURS ⌚

AND TAKE WHATS OURS

Explanation:

fr what is it?

7 0
2 years ago
Read 2 more answers
Which of the following is a command shell with a built-in scripting language?1. The Server Manager’s Roles and Features wizard2.
IgorLugansk [536]
Your kinda right but wrong
4 0
3 years ago
Read 2 more answers
How do multi-cellular organisms develop?
FromTheMoon [43]
Letter B. is the answer
<span>B.  Cell differentiation - start from a single cell and as the cells divide they become specialized</span>

HOPE THIS HELPS















4 0
3 years ago
Computers influenced the outcome of world war 2 by?
Elan Coil [88]

Answer:

Computers were introduced to the U.S. Navy on the eve of war for submarines. The computers used trigonometry to help the submariners know when to fire their torpedoes at a moving target. These devices were expanded to surface ships to provide more accurate firing of the guns.

Explanation:

3 0
2 years ago
Write a C++ program that will ask the user for the name of a data file.
rosijanka [135]

Answer:

Explanation:

Enter information,

Enter name: Bill

Enter roll number: 4

Enter marks: 55.6

Displaying Information,

Name: Bill

Roll: 4

Marks: 55.6

THIS IS AN EXAMPLE I HOPE THIS HELPS YOU!!

4 0
2 years ago
Other questions:
  • In which scenario would instant messaging be more useful than other forms of communication?
    10·1 answer
  • Which is a copyright
    5·1 answer
  • A lever has an effort arm that is 8 meters long and the residence (load) arm that is 1.5 meters long, how much effort is needed
    7·1 answer
  • ​______________________ is a general security term that includes computer​ viruses, worms, and trojan horses.
    13·1 answer
  • Within an event-driven program a component from which an event is generated is the ____
    10·1 answer
  • 2. (8 points) When creating the Academic Database, there were several instances of data
    11·1 answer
  • The Company should use BLANK cables to provide Fast connectivity without electrical interference
    6·1 answer
  • 8.11 LAB: Filter and sort a list
    8·1 answer
  • Koi jinda hei kya hello​
    13·2 answers
  • ZipCar uses cutting edge wireless technology combined with sophisticated data management and security techniques to assure that
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!