1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NARA [144]
3 years ago
6

An author is preparing to send their book to a publisher as an email attachment. The file on their computer is 1000 bytes. When

they attach the file to their email, it shows a 750 bytes. The author gets very upset because they are concerned that part of their book has been deleted by the email address
If you could talk to this author, how could you explain what is happening to their book?
Computers and Technology
1 answer:
Yakvenalex [24]3 years ago
6 0

Answer:

See explanation

Explanation:

My explanation to the author is that:

The reduction in size of the attachment doesn't mean that some parts of the book (i.e. the attachment) has been deleted.

I'll also made him understand that the book will retain its original size and contents after downloading by the recipient of the mail.

You might be interested in
Guys I need help I cant download anything in the app store I restarted my phone and I know it's not the space on my phone I have
Simora [160]

Can you give me further explanation? For example, how is your phone not letting you download things? What model of a phone is it? what update is it on? and to what extent can you download something?

4 0
2 years ago
What is the key difference between UDP and TCP protocols in TCP/IP reference model?
g100num [7]

Answer:

TCP is a connection-oriented protocol, whereas UDP is a connectionless protocol. The speed for TCP is slower while the speed of UDP is faster.

5 0
2 years ago
Read 2 more answers
47. Which of these examples demonstrates good netiquette?
Masteriza [31]

Answer:

typing it, on a video detailing how boring and poorly made it is

Explanation:

this is an example of good netiquette because they are criticizing the video game and what good netiquette is is making a comment relevant to the original message. the original message being the video game

3 0
3 years ago
What tool might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrati
Soloha48 [4]

A tool which might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations is: Whois.

<h3>What is a DNS server?</h3>

A DNS server can be defined as a type of server that is designed and developed to translate domain names into IP addresses, so as to allow end users access websites and other internet resources through a web browser.

This ultimately implies that, a DNS server refers to a type of server that translate requests for domain names into IP addresses.

In this context, we can infer and logically deduce that Whois is a tool which might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations.

Read more on a domain names here: brainly.com/question/19268299

#SPJ1

4 0
11 months ago
The process known as "bitmapping" is defined as information in _____. <br><br> finish the sentence.
valentina_108 [34]

graphics is the answer

4 0
2 years ago
Other questions:
  • the majority of refrigeration systems in residential comfort cooling systems use what type of system?
    13·1 answer
  • Who are the founders of Microsoft?
    5·1 answer
  • If you want a user to enter exactly 20 values, which loop would be the best to use?
    9·1 answer
  • According to your​ reading, Macy's uses​ ________ technology to track individual items for sale on store shelves.
    5·2 answers
  • ((11111111-1011100) X (10100 / 10))- ( 110010000+ 1110011)
    14·1 answer
  • Can a 3048 hp motherboard support a i7 10700k cpu?
    11·2 answers
  • 23. ____________ is a slide that is used as the base design theme for other slides.​
    11·1 answer
  • Anyone have any website ideas I could use for my computing website project? Thank you.
    15·2 answers
  • security investigators discovered that after attackers exploited a database server, they identified the password for the sa acco
    9·1 answer
  • Passing an argument by ___ means that only a copy of the arguments value is passed into the parameter variable and not the addrt
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!