1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erik [133]
3 years ago
5

Electronic mail is best used to:

Computers and Technology
2 answers:
Luden [163]3 years ago
8 0

Answer:

send and receive messages via the internet

mojhsa [17]3 years ago
4 0

Answer:

a and b

Explanation:

because iam smart

You might be interested in
Which of the following function declarations correctly expect an array as the first argument?
NARA [144]

Answer:

Only

Option: void f1(float array[], int size);

is valid.

Explanation:

To pass an array as argument in a function, the syntax should be as follows:

functionName (type arrayName[ ] )

We can't place the size of the array inside the array bracket (arrayName[100]) as this will give a syntax error. The empty bracket [] is required to tell the program that the value that passed as the argument is an array and differentiate it from other type of value.

3 0
3 years ago
Driving at slower speeds than traffic flow _____________ .
UNO [17]
The answer is B. may impede other vehicles on the road that are traveling at a normal and safe speeds
4 0
3 years ago
Why are your interactive ads so broken?
VladimirAG [237]

Answer:

lol truuuue

Explanation:

5 0
2 years ago
When was the speaker invented?
wlad13 [49]

Answer:

Explanation:

1876

4 0
2 years ago
Read 2 more answers
An administrator needs to protect rive websites with SSL certificates Three of the websites have different domain names, and two
Marysya12 [62]

Answer:

Option A (One SAN certificate) is the right answer.

Explanation:

  • A vulnerability management certificate that permits many domain identities to be safeguarded by such a singular or unique certification, is considered a SAN certificate.
  • Though on the verge of replacing common as well as accepted security credentials with either of these de-facto certifications.

Other alternatives are not connected to the given scenario. Thus the above option is correct.

5 0
2 years ago
Other questions:
  • What is an example of constructive criticism for an employee who frequently arrives late?
    10·2 answers
  • Plugging in a cable is a good troubleshooting technique. <br> True or false
    5·1 answer
  • (It science question)
    9·1 answer
  • All linear programming problems have all of the following properties EXCEPT
    9·2 answers
  • As time goes on, technology is likely to _______. A. Increase in complexity b. Decrease in complexity c. Stay at the same comple
    8·1 answer
  • How would improving the nutritional health of an entire community impact the overall physical, emotional, and financial health o
    14·1 answer
  • write a C program the prints out the size of variables with the following C data types- int, long, unsigned, long long, double,
    7·1 answer
  • What software maintain and increase the efficiency of a computer system?
    12·1 answer
  • Which Backstage view feature helps you to specifically remove customized information from a document? Protect Document Feedback
    14·1 answer
  • A user can add color to a database to highlight a modification. To do this with a macro, which command screen would you access o
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!