1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novosadov [1.4K]
3 years ago
5

In 5-10 sentences, describe the procedure for responding to an e-mail message.

Computers and Technology
1 answer:
miss Akunina [59]3 years ago
7 0

Answer: See explanation

Explanation:

The procedure fur responding to an email message goes thus:

The first thing to do is to open the website of the email. Then, you would click on "compose".

When you click on compose, you'll see some space where you'll fill some information such as the email of the person that you're sending to, that is, the receiver. You'll also feel the subject of the email.

Then you type the content of your message. When you're done with this, then you click on send.

You might be interested in
. Which one of the following is not a typical engine cylinder arrangement? A. V-type B. Dome-type C. In-line D. Horizontally opp
Tomtit [17]
The answer would be B. Dome-Type. V-Type engines are some of the most common, with abbreviations such as V6, V8, etc. In-Line engines are where the cylinders are in a straight line. Horizontally opposed engines or 'flat' engines are where the cylinders are on a flat plane. Therefore the only type of engine *configuration* is B. Dome-Type.

Dome-type relates to the cylinder design, where the piston has a convex dome to maximize the efficiency.

Hope this helps.
4 0
3 years ago
FOLLOW INSTRUCTIONS BELOW , WRITTEN IN JAVA LANGUAGE PLEASE AND THANK YOU !
boyakko [2]
It’s a lot of reading sorry can’t help you but try your best too
7 0
3 years ago
A firm is assigned the network part 133.44. It selects an 12-bit subnet part. Note that this is not on an octet (8-bit boundary)
Andreas93 [3]

Answer:

Hello the options to your question are missing here are the options

a. 1022

b. 62

c .14

d. None of the above

Answer : None of the above ( d )

Explanation:

A firm is assigned the network part 133.44. It selects an 12-bit subnet part.  The number of  hosts  possible are

= 2^{12}   - 2

= 4094

Note : Subnetting is a technique that lets network administrators use the 32 bits available but  the actual host ID portion of the subnetted address is 12 bits in length.

5 0
4 years ago
Secure software development: a security programmer's guide by jason grembi isbn-10: 1-4180-6547-1, isb-13: 978-1-4180-6547
a_sh-v [17]

Secure software development is known to be a kind of methodology (often linked with DevSecOps) for making software that incorporates a lot of security into every stage of the software development life cycle (SDLC).

<h3>What is secure software development practices?</h3>

Secure software development is  seen as a method that is used form the creation of a lot of software that uses both security into all of the phase of the software development making cycle.

This book is known to be  A Programmer's Guide that can be able to  leads readers in all of the tasks and activities that one can do to be successful computer programmers and it is one that helps to navigate in the area of reading and analyzing requirements as well as choosing development tools, and others.

Hence, Secure software development is known to be a kind of methodology (often linked with DevSecOps) for making software that incorporates a lot of security into every stage of the software development life cycle (SDLC).

Learn more about  Secure software development  from

brainly.com/question/26135704

#SPJ1

7 0
2 years ago
It is necessary for us to verify and checked information before we shared online? Explain​
lesya [120]

Answer:

The answer is yes.

Explanation:

If you don’t check where the source is from and if it is verified, you may share an incorrect and false answer. Also, you may type in your personal information. This is <u>VERY</u> risky. Do <u>NOT</u> share your private information to strangers!

You can check your information by searching it up online or asking a teacher! There! I hope this helps! ;)

4 0
2 years ago
Other questions:
  • What can help you best learn about appearance, habitats and behaviors of birds in your area
    9·1 answer
  • What is information reach? A. A global public network of computer networks that pass information from one to another using commo
    5·1 answer
  • A review of the sales, costs, and profit projections for anew product to find out whether these factors satisfy the company'sobj
    15·1 answer
  • 1.1. (30 points) Write a program to calculate the average number of cars sold by a car agency over a period of years for the fir
    6·1 answer
  • The primary function of the average command is what?
    15·1 answer
  • Henry has created a software that manages a database of all his music. He wishes to run the software on another computer system
    12·2 answers
  • What is the Internet address of the speech you listed to?
    14·1 answer
  • Which part of project management involves determining the required materials?
    7·2 answers
  • A Windows user is locked out of her computer, and you must log into the local administrator account Helpdesk Admin. Which would
    10·1 answer
  • Bộ mã I mã hóa được nhiêu kí tự
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!