1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Y_Kistochka [10]
3 years ago
14

What are the requirements to access email on the web?

Computers and Technology
2 answers:
beks73 [17]3 years ago
8 0

Answer:

it's B

Explanation:

You need to have a provider (such as outlook) and a username/password

mihalych1998 [28]3 years ago
5 0
It’s either A or D u Choose now
You might be interested in
Which osi layer is responsible for combining bits into bytes and bytes into frames?
Nastasia [14]
If you are breaking the computer down try in software it does change after a while
3 0
4 years ago
A batholith is an example of a(n) _____ igneous rock (one of the two main igneous rock groups).
Naily [24]
A batholith is an intrusive igneous rock.
3 0
4 years ago
Read 2 more answers
Which button is used to set up the pen color?
Mrac [35]
C. custom slideshow because this is where you can customise everything you do eg. pen colour, don't etc.
5 0
4 years ago
Read 2 more answers
Blank uses computer resources from multiple locations to solve a common problem.
DedPeter [7]

Answer:

Grid computing

Explanation:

3 0
3 years ago
A firm is assigned the network part 133.44. It selects an 12-bit subnet part. Note that this is not on an octet (8-bit boundary)
Andreas93 [3]

Answer:

Hello the options to your question are missing here are the options

a. 1022

b. 62

c .14

d. None of the above

Answer : None of the above ( d )

Explanation:

A firm is assigned the network part 133.44. It selects an 12-bit subnet part.  The number of  hosts  possible are

= 2^{12}   - 2

= 4094

Note : Subnetting is a technique that lets network administrators use the 32 bits available but  the actual host ID portion of the subnetted address is 12 bits in length.

5 0
4 years ago
Other questions:
  • If you touch a downed power line covered or bare, what’s the likely outcome?
    10·2 answers
  • An agile team used planning poker to estimate user stories. After all team members read a user story, the facilitator asks every
    7·1 answer
  • Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
    9·1 answer
  • What tool is included with windows 8 that will help you connect to the directaccess server when you have problems and can be use
    6·1 answer
  • Which magazie can help the public determine the best technology to use
    10·1 answer
  • When you cut and then paste a file, what are you doing?
    7·2 answers
  • Consider the relational schema below: Students(sid: integer, sname: string, major: string) Courses(cid: integer, cname: string,
    9·1 answer
  • If you have 128 oranges all the same size, color, and weight except one orange is heavier than the rest. Write down a C++ Code/A
    7·1 answer
  • What are the purposes of using a text-to-speech tool? Check all that apply.
    9·2 answers
  • Write a program that will input two numbers and print the larger number on the screen.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!