1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
13

What is it called when a additional document is added to an email

Computers and Technology
2 answers:
LUCKY_DIMON [66]3 years ago
8 0
A new data to save last chest
svetoff [14.1K]3 years ago
7 0

Answer:

I believe it's an attachment.

Explanation:

You might be interested in
PLEASE ANSWER
son4ous [18]

Answer:

Turing test is the answer

8 0
3 years ago
John have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the da
xeze [42]

Answer: Mutual authentication

Explanation: Mutual authentication could be referred to a vetting process where the two entities in communication authenticate each other, it could also be referred to as a two-way authentication.

In the scenario above, the cloud service or server authenticates itself with the client and the client authentication itself with the cloud service server by verifying or vetting the certificates of both communicating entities before a secure encrypted connection would be established or created.

8 0
3 years ago
Read 2 more answers
Which tool uses images and other visual elements to provide artistic
timofeeve [1]

Two of the tool that uses images as well as other visual elements are;

Adobe Illustrator and Adobe Photoshop.

<h3>What are tools for designing?</h3>

Designing tools are the software that is been use to provide artistic inspiration  and used for different purpose of design.

These tools are very interesting and they provide artistic inspiration to programmers who are designing a program.

Learn more about tools at:

brainly.com/question/11013757

3 0
3 years ago
Why do we need to update database regularly
sergiy2304 [10]
To protect from attackers gaining access by sitting on a certain configuration too long. 
7 0
3 years ago
What is the characteristics of a spear phishing message
Cerrena [4.2K]
It is targeted at one person specifically. More work for the attacker, but higher chances of obtaining sensitive information.
7 0
3 years ago
Read 2 more answers
Other questions:
  • Why do we use modem while<br>accessing the internet or email​
    10·1 answer
  • A technician wants to create a new partition on a new additional hard drive. what tool should be used?
    15·1 answer
  • What are the stages in the development of a multimedia project?
    6·1 answer
  • Su
    6·1 answer
  • There are three managerial skills listed that a good administrative medical assistant (MAA) should prosses
    7·1 answer
  • Varied amount of input data Statistics are often calculated with varying amounts of input data. Write a program that takes any n
    8·1 answer
  • A Python keyword ______________.
    15·1 answer
  • Because all the IEEE WLAN features are isolated in the PHY and ____________ layers, practically any LAN application will run on
    11·1 answer
  • Choose the correct term to complete the sentence.
    12·1 answer
  • Give five example of secondary storage device, stating their function and storage capacity​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!