1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
2 years ago
7

What field is used to send a copy of an e-mail message?

Computers and Technology
1 answer:
vampirchik [111]2 years ago
7 0
The CC field is used to send a copy of an email. CC stands for carbon copy.
You might be interested in
write a program that will create an array of 100 random integers in the range from [0,99] pass the array to a function, printarr
slava [35]

Answer:

In C++:

#include <cstdlib>  

#include <ctime>  

#include <iostream>

#include <bits/stdc++.h>

using namespace std;

void printarray(int array []){

for(int i=0; i<100; i++){         cout << array[i] << " ";    }

}

void sortarray(int array []){

sort(array, array + 100);

   printarray(array);

}

int main() {  

   int array[100];

   srand((unsigned)time(0));  

   for(int i=0; i<100; i++){  array[i] = (rand()%99);     }

   printarray(array);

   cout<<endl;

   sortarray(array);

   return 0;

}

Explanation:

<em>See attachment for program source file where comments are used for explanation purpose</em>

Download cpp
5 0
2 years ago
write pseudocode to represent the logic of a program that allows the user to enter two values. The program outputs the sum of an
valkas [14]

The pseudocode representing the above described logic of a program is:

start

input num1

input  num2

set product  =  num1*num2

output product

stop

See the related flow chart is attached.

<h3>What is a pseudocode?</h3>

Pseudocode is a precise yet comprehensible explanation of what a computer program or algorithm must perform, written in normal language rather than programming language.

Pseudocode is occasionally used as a detailed phase in the development of a program.

Learn more about Pseudocode:
brainly.com/question/24953880
#SPJ1

4 0
1 year ago
Identify the term that refers to the right to control access to ourselves and to our personal information.
g100num [7]

Answer:

Privacy

Explanation:

In the privacy control access mechanism it control the data of the personal information.The model P-RBAC that is the framework of key component that extended the RBAC model that gives the complex  policy of privacy such as obligations.In the P-RBAC we defined the privacy awareness permission.

The privacy control access mechanism giving the right to control the personal information.

7 0
2 years ago
Is this right or not???????????
borishaifa [10]
I think it’s true Bc some people may use different techniques
6 0
2 years ago
Read 2 more answers
What do you mean by networking devive?​
s2008m [1.1K]

Answer:

Networking Device are Those Device which are required for communicating and interacting between device and a computer network.

Explanation:

6 0
3 years ago
Other questions:
  • The giant eniac stores how much size memory
    13·1 answer
  • A/an ___________ is a scheduling tool that sets the standard and nonworking time for the project and is used to assess how tasks
    6·1 answer
  • Chat messages are most likely to be found where on a computer? firewall nic internet history ram
    7·1 answer
  • WHERE WAS THE CHEESEBURGER INVENTED?
    9·1 answer
  • What command is used to add a reflection or an outline to text
    7·1 answer
  • Someone please help me with the right answer please
    12·1 answer
  • Do word provides an undo button that can be used to cancel the most recent command or action
    13·1 answer
  • If you were practicing keyboarding and the exercise contained the letters j, k, l, m, n, and b, what section of the
    14·1 answer
  • What amount of memory enough to store alatter of the alphabet or store a small number​
    6·1 answer
  • You are working on a ticket for a user who cannot access the Internet from their PC. After troubleshooting, how do you confirm t
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!