1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goshia [24]
3 years ago
7

Libby wrote an email to her friend. She pressed Shift and the number key 2 together to enter the email address. Which symbol did

Libby type?
Computers and Technology
2 answers:
tigry1 [53]3 years ago
7 0

Libby typed the ' @ ' symbol.

exis [7]3 years ago
4 0

When Libby wrote the email to her friend, she typed the '@' symbol. When pressing SHIFT and 2 together, it pastes this aforementioned symbol. However, there isn't any specific name for the symbol. As a matter as fact, there are several names that this symbol goes by.

The most famous name this symbol is called is the "at symbol" or the "at sign". In terms of a formal name, "commercial at" would be a good one.

Here's an example with the symbol:

[email protected]

This is essentially telling the email server where to send your email. From this, they'll know it's located at brainly.com! It's pretty neat.

You might be interested in
Why does someone put 'human' at the end of their social media profile as a summary or description? I've seen this a lot online n
Vikki [24]
Becuase some profiles are bots or fake
6 0
3 years ago
HELPPPP MEEEE!!!!! ITS LIFE OR MUERTEEE
garri49 [273]

The author uses the text structure of compare and contrast to show multiple signals.

<h3>What is Text structures?</h3>

This is a term that connote the method used by authors to put together information in text.

Note that in the case above, The author uses the text structure of compare and contrast to show multiple signals.

Learn more about text structure from

brainly.com/question/12053427

#SPJ1

8 0
2 years ago
In an ha configuration, which two failure detection methods rely on icmp ping? (choose two.)
Hunter-Best [27]
I believe that the multiple questions attached to this question is 

a) Hello
b) Link groups
c) Path groups
d) Heartbeats

The Answer is B and C
The physical interfaces that are supposed to be monitored are connected into a link group and a firewall failure can be triggered when one or all physical interfaces in the group failPath Monitoring helps monitor the full path to mission critical IP addresses. By default, any one of the IP addresses becoming unreachable will end up causing the firewall to change the HA to tentative state
7 0
3 years ago
Hurry please i need this ASAP<br><br>What might be some advantages to keeping CSS and HTML separate?
marusya05 [52]

Answer:

The separation of HTML from CSS makes it easier to maintain sites, share style sheets across pages, and tailor pages to different environments. This is referred to as the separation of structure (or: content) from presentation.

Explanation:

I think this right don't add me right then add

6 0
3 years ago
What are threats to computer system
4vir4ik [10]
Breach..
bugs and viruses
hack
3 0
4 years ago
Read 2 more answers
Other questions:
  • 1. When centering one paragraph on a page of text, the user needs to _____.
    15·2 answers
  • Studying MyMagic+ helps one understand the costs associated with information systems deployment at scale. According to your read
    12·1 answer
  • Your boss bought a new printer with a USB 3.0 port, and it came with a USB 3.0 cable. Your boss asks you:
    7·2 answers
  • What is an instruction set architecture​
    7·2 answers
  • 1.6 code practice: question 1 edhesive
    12·2 answers
  • What are the 2 things you are not sure about evaluating functions​
    7·2 answers
  • Guess The Song:
    9·1 answer
  • Question 7 (True/False Worth 3 points)
    8·2 answers
  • Zachary drinks 2 cups of milk per day. He buys 6 quarts of milk. How many days will his 6 quarts of milk last?
    12·1 answer
  • NAT addresses concerns over the dwindling IPv4 address space by ___________________. 1 point allowing networks to use fewer IP a
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!