1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vsevolod [243]
3 years ago
9

What is the main reason for adding somebody into the BCC list for an email?​

Computers and Technology
1 answer:
Fiesta28 [93]3 years ago
6 0

Answer:

protecting email address privacy

Explanation:

for securing and privacy reasons and it is for the best

You might be interested in
What form of contacts can be shared in Outlook 2016?
ArbitrLikvidat [17]

Answer:

shared contacts

Explanation:

5 0
4 years ago
Read 2 more answers
Which year was the Apple 2 released? <br>A) 1979 <br>B). 1973 <br>C). 1980 <br>D). 1977​
sesenic [268]

Answer:

1977

Explanation:

Apple 2 was released in April 19th 1977

6 0
3 years ago
Read 2 more answers
Another pitfall cited in Section 1.10 is expecting to improve the overall performance of a computer by improving only one aspect
Alexandra [31]

Answer:

<u>note:</u>

<em><u>solution is attached in word form due to error in mathematical equation. furthermore i also attach Screenshot of solution in word due to different version of MS Office please find the attachment</u></em>

Download docx
8 0
4 years ago
As the network engineer, you are asked to design an IP subnet plan that calls for three subnets. The largest subnet needs a mini
Delvig [45]

Answer:

192.168.0.0 / 255.255.255.192

Explanation:

Given:

As the network engineer, you are asked to design an IP subnet plan that calls for three subnets. The largest subnet needs a minimum of 52 hosts. Management requires that a single mask must be used throughout the Class C network.

Solution:

192.168.0.0 / 255.255.255.192 is a private IP network and mask that would meet the requirements.

8 0
3 years ago
Describe the key differences between raster-based and vector-based graphics.
Kazeer [188]

Answer:

asd

Explanation:

8 0
3 years ago
Other questions:
  • When does a kernel panic occur?
    12·2 answers
  • What wired channel, commonly used for cable tv, consists of an insulated copper wire wrapped in a solid or braided shield placed
    12·1 answer
  • Which was the first media-sharing website that allowed users to submit their own work on the site?
    7·1 answer
  • Write the definition of a method dashedLine, with one parameter, an int. If the parameter is negative or zero, the method does n
    8·1 answer
  • Dereck works for long hours on his computer. He frequently experiences physical strain by the end of the day because he does not
    13·2 answers
  • Why is outfitting a workplace with video games in a technology development company consiered a strategic use of money
    14·1 answer
  • 1. The @ symbol is used to denote:​
    7·1 answer
  • i need to also do a algorithm where if the total is a even number 10 points are added to the score and if the total is odd then
    11·1 answer
  • 4.In order for a driver to graduate from a learner’s license to an operator’s license, how many hours of driving need to be docu
    11·1 answer
  • An input value has to be greater than 18 and less than 65 if a driving license is to be approved for issue. What type of input c
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!