1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alinara [238K]
3 years ago
10

host b is sending an email intented for the user on host a to the mail server what protocol is being used to send the message

Computers and Technology
1 answer:
KatRina [158]3 years ago
3 0

Answer:

SMTP

Explanation:

This is the SMTP or the Simple Mail Transfer Protocol. It is the push protocol and is used to send the mail message. Whereas POP3 and IMAP are meant for retrieving the message. These are the three main types of protocols associated with mail services. And the correct answer here is certainly the SMTP.

You might be interested in
Explain each of the three important concepts behind the Federal Networking Council's definition of the term Internet. Explain ho
maria [59]

Answer:

The three important concepts in the Federal Networking Council's definition of the Internet are, namely;

  • Packet switching
  • The TCP/IP communications protocol
  • Client/server computing

Explanation:

  • Packet switching involves the transfer of data which are grouped into different packets and then sent over a digital network to their respective destination. After the data are received at the destination site, they are then extracted and used by the application software.
  • The transmission control protocol/internet protocol allows one computer to connect or communicate with another one through the internet. The internet protocol defines how to route and address each packet to ensure it gets to the right destination. The IP address of a particular device on a network is usually unique to that device.
  • Client/server computing describes how a server provides services by taking requests from clients computers and sharing its resources with one or more computers.
7 0
3 years ago
How does a scriptwriter show the design team how different player actions should affect the game?
Musya8 [376]
Storyboardbhsisiebebhdbebbdud
6 0
3 years ago
Elan inserted shapes into a slide in his presentation. What is the quickest way to format those shapes?
Jlenok [28]

Answer:

c. Shape Styles gallery

Explanation: is correct. post protected

4 0
3 years ago
Which of the following is not a language commonly used for web programming? PHP Assembly Java Python
Nataly [62]

Answer:

If you’re a software developer, then you probably—every now and then—feel overwhelmed by the super-fast pace at which our industry evolves, and that’s fine. I certainly feel that way sometimes, especially when trying to keep up with the latest trends.

But it’s possible to be well-informed about what’s going on out there, and use that information to your advantage, by being economical about your learning.

Sure, there are lots of programming languages. Sure, new ones keep being created every week—and don’t even get me started on JavaScript frameworks.

Do you need to learn all of them? Of course not.

First, learn about a number of the most popular programming languages. Then, narrow that list down, by picking the ones that make the most sense for your current knowledge level, employment status and other criteria that might make sense for your scenario.

For instance, if you intend to learn the functional paradigm, then pick a functional language from the list. Rinse and repeat.

That’s what this post is about. We’ve done the legwork for you, compiling a list of five of the most popular programming languages for 2019. Now you only have to read it and put it to good use.

(Hope this helped if not i am so so sorry hope you have a blessed day goodbye)

7 0
3 years ago
Read 2 more answers
State and explain five misused of science and technology​
kap26 [50]

Answer:

Science and technology is the major key of life cycle.

Explanation:

Any five misused of science and technology are:-

•Guns and weapons to clash.

•Phishing sites

•Scamming online or on online shopping.

•Misusing social media and our phones.

•Crazy addictive online games.

6 0
3 years ago
Other questions:
  • In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target fr
    14·1 answer
  • Describe the use of technology in the promotional function
    5·2 answers
  • Do clocks have cell's?
    15·2 answers
  • I have six nuts and six bolts. Exactly one nut goes with each bolt. The nuts are all different sizes, but it’s hard to compare t
    12·1 answer
  • What is the device that is non-volatile sometime called external memory?<br>​
    15·1 answer
  • Brainliest For Tascake Because People Texted Before Tascake Could<br><br> Hurry Tascake
    13·2 answers
  • 1. Who is affected by electronic theft of a song?
    5·2 answers
  • SmartArt is a Microsoft Office tool for creating what?
    11·2 answers
  • Type the correct answer in the box. Spell all words correctly. Which language should you use to add functionality to web pages?
    5·1 answer
  • a network administrator for a large oil company has discovered that a host on the company network has been compromised by an att
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!