1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8090 [49]
3 years ago
9

1. Would it be possible for two people to have the same email address? Explain.

Computers and Technology
2 answers:
Talja [164]3 years ago
7 0

Answer:

no

Explanation:

because  if i email you then the computer would not know which one to send it to so the answer is no  

Goshia [24]3 years ago
6 0

Answer: No

Explanation:

For the same reason that two people cannot have the same address, it's just a virtual address.

You might be interested in
Can i add ADSence on bangla content in blogsopt website?
Inga [223]

Answer:

I do not think you can! However, I am not sure since I mainly use Wix!!!

Explanation:

8 0
3 years ago
Why is it a good idea to only use one word for everything you create in Scratch, even though you can technically use two words f
Keith_Richards [23]

Answer:So if your in a situation where you need 1 of those words then your strategy would come in handy.

Explanation:

7 0
2 years ago
Program C++ I need help!
nikitadnepr [17]

Answer:#include <iostream>

using namespace std;

int main()

{

   int factorial = 1;

   for (int i = 5; i > 0; i--) {

       factorial = factorial * i;

   }

   cout<<factorial;

   return 0;

}

Explanation:

3 0
3 years ago
Observing users as they enter passwords or other personal information to a computer Auditing software often used to test compute
GuDViN [60]

Answer:

Explanation:

1. Observing users as they enter passwords or other personal information to a computer Auditing software often used to test computer data - (shoulder surfing)

2. An acronym for security institute that studies computer crime activities The act of altering data that are entered into, or used by, a computer --- (CSI)

3. A small text file that stores information about your browsing habits and interests Stealing personal information from trash cans - (COOKIES)

4. A software program specifically designed for computer forensic investigations - (EnCase)

5. A type of fraud in which the perpetrator steals small amounts from many different accounts - (salami technique)

6. A software program or hardware device designed to prevent unauthorized data communications - (firewall)

7. Malicious software similar to a computer virus -- (_worm)

8. Federal legislation aimed specifically at computer crime (CFAA)

8 0
3 years ago
You defined a book data type.
earnstyle [38]

Answer:

myBook.title('To Kill a Mockingbird')

Explanation:

Correct answer edge 2020

5 0
3 years ago
Other questions:
  • Which of these molecules has the same number of shared and unshared electron pairs?CCl2F2Br2HClPF3H2S
    9·2 answers
  • What are two tasks that need to be done to a hard drive before operations can use it
    11·1 answer
  • Can someone help me with these questions it's for drivers ed
    10·1 answer
  • It's usually easier to change the design of a photo album slide show A.after you've created the presentation. B.before you've cr
    15·1 answer
  • What is one similarity between low-and high-level programming languages? (5 points)
    14·1 answer
  • Heeeeeeeelp :)<br> thx<br> jfdyiusjmkdsuiho;dmcvrvho;j
    5·2 answers
  • 60 points!
    14·2 answers
  • Why is it necessary to have a w-2 or 1099 form when using tax preparation software?
    13·1 answer
  • What is the scope of AS-26
    8·1 answer
  • You must configure a certificate authority on your network to use EFS. True or False?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!