1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrMuchimi
3 years ago
8

Guidewords for the word “serpent” may be

Computers and Technology
2 answers:
Bumek [7]3 years ago
5 0

Answer:

snake

Explanation:

bagirrra123 [75]3 years ago
5 0

Answer:

snake or a family that belongs to snake

You might be interested in
Mike is reading about machine-dependent programming languages. Which languages are machine-dependent programming languages?
Scilla [17]

Answer:

Assembly Language

Explanation:

Machine dependent is a language that only runs on specific machines. The early languages were machine-dependent while the advanced languages are machine-independent.

In the early languages, the main machine dependent language was machine language. Later on, Assembly language was introduced. Assembly language was also machine-dependent as it only runs on specific kinds of PCs.

8 0
3 years ago
The first version of the SMTP protocol was defined in RFC 821. The current standard for SMTP is defined in RFC 5321 considering
valentinak56 [21]

Answer:

The following are the explanation for each command, with the SMTP protocol considering only RFC 821.

Explanation:

The key commands of the SMTP protocols which take the RFC 821 into account are as follows:

HELLO -  

A client receives that order to describe himself  

HELP-  

It asks by the receivers to submit the command information as argument  

QUIT -  

It is used to terminate the message.  

-FROM MAIL  

The clients use it to acknowledge the message's sender.  

NOOP -  

The client does not use any procedure to verify the receiver status as required by the receiver's reply form.  

RCPT-  

The user needs it to determine the intended beneficiary.  

SAML-  

It sends or ends the specific mail which is sent to the mailbox or the SAML

RESET-  

The existing email transaction is aborted.  

SEND- The mail to be sent by the recipient's terminal, not its mailbox, is specified.  

TURN-  

It allows the sender to change position and recipients.  

VRFY-  

Verification checks the recipient's address.

 

7 0
3 years ago
What must you do first in order to change the font type size and colour of a particular text
salantis [7]
Highlight the text you want to change
3 0
3 years ago
Read 2 more answers
What are the possible consequences of intentional virus setting?
natali 33 [55]

<u>The possible consequences of intentional virus setting:</u>

Virus is nothing but desktop or laptop or tablet OS has to do certain process as on its own which diverse other  to different process  such us stealing the data from desktop or laptop or tablet and making slow the performance of desktop and laptop  and tablet.

To avoid or protect the computer there are two type of antivirus.

  • On desktop or tablet or laptop. (It is called resident firewall).
  • Internet gateway. (It is called firewall)

So company create virus and to rectify they make money of that process.

To protect our desktop or laptop or tablet from virus we are protected with law. In case due to virus attacked our laptop or desktop or tablet Is effected we can fine the or sent to jail by law.

3 0
3 years ago
The analysts at Techno Info Systems are considering the four-model approach to system development for a new client. If they make
Natali [406]

Answer:

Option B is correct.

Explanation:

Within Techno Info Systems the user has been analyst contemplating that four-model concept towards computer development for such its new customer. When they adopt that four-model method, thus the result seems to be the time taken to implement the rises in the method.

So, therefore the other options are incorrect according to the following scenario.

4 0
3 years ago
Other questions:
  • What is the purpose of a scatter plot introduction to computer applications
    6·2 answers
  • If a user receives a message whose tone and terminology seems intended to invoke a panic or sense of urgency, it may be a(n) ___
    13·1 answer
  • How is a correction made to an Electronic health record?
    14·1 answer
  • A Windows application which demands a lot of raw processing power to execute repetitive complex calculations is a good candidate
    9·1 answer
  • In Microsoft Word, when you highlight existing text you want to replace, you're in
    7·1 answer
  • What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's dev
    5·2 answers
  • Write a C++ program that computes an approximation of pi (the mathematical constant used in many trigonometric and calculus appl
    15·1 answer
  • Guess The Song:
    9·1 answer
  • What is are the most efficient ways to make a slide presentation?
    12·2 answers
  • Send link for a qc or paddle
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!