1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alinara [238K]
3 years ago
10

host b is sending an email intented for the user on host a to the mail server what protocol is being used to send the message

Computers and Technology
1 answer:
KatRina [158]3 years ago
3 0

Answer:

SMTP

Explanation:

This is the SMTP or the Simple Mail Transfer Protocol. It is the push protocol and is used to send the mail message. Whereas POP3 and IMAP are meant for retrieving the message. These are the three main types of protocols associated with mail services. And the correct answer here is certainly the SMTP.

You might be interested in
You will start by doing a bit of research on viewfinders and LCD displays on digital cameras. After you feel that you have an un
Lemur [1.5K]

Answer:

SOMEBODY ANSWER IT

Explanation:

JESUS C

3 0
3 years ago
After separating from Mexico, Texas passed laws that made it harder for slave owners to _____________ slaves.
baherus [9]

Answer: b.

Explanation:

8 0
2 years ago
Read 2 more answers
Using a pin or password in addition to tpm is an example of what type of authentication?
anzhelika [568]
Considering it is private i would say security?
3 0
3 years ago
In order to prevent unauthorized access, how can the shadow file be configured to enforce a password policy?​ What happens to ac
NemiM [27]

Answer : The securtiy of the password can be maitained by the shadow files such as:-

  • max is for the days that represent that the same password can be used without the need for changing it  
  • min is for the days that represent waiting days before the changing of password after he/she gets a new password
  • warn are the days that come with Waring sign that the password is going to expire soon.

For a certain period of time , the user can access the log in when the password has expired . If that period is timed out then there will be no log in option and the account gets disabled.

4 0
3 years ago
What is an example of fibre optic cable<br>​
Arte-miy333 [17]

Answer:

printing cable

Explanation:

is a cable used to transfer information from a computer to the printer in packages

5 0
2 years ago
Other questions:
  • you install teamviewer on your workstation at home so that you can ac ess it when on the road. how can you be assured that unkno
    9·1 answer
  • Match the items.
    15·1 answer
  • When we put 10+ points for when we ask a question, do we loose the points we have?
    12·1 answer
  • ​User documentation _____. Group of answer choices ​allows users to prepare overall documentation, such as process descriptions
    9·1 answer
  • A(n) __________ item is a hardware or software item that is to be modified and revised throughout its life cycle
    10·1 answer
  • What do the groups in professional networking sites allow you to do?
    10·1 answer
  • What happens to a message when it is deleted?
    11·1 answer
  • Which graphic file format is used for commercial purposes.
    10·1 answer
  • Which of the following is NOT a type of insurance fraud?
    14·2 answers
  • What is computer fundamental ?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!