Web based e-mail accounts do not require an email program to be installed on your ________.

Answers

Answer 1

A web-based e-mail account or application can be opened directly into a web browser and it doesn’t require an email program to be installed on your computer.

A web-based email accounts application can be opened directly into a web browser. Because these applications are mostly web-based. However, some web-based email account provider companies now provided a desktop application to open and compose an email on the desktop.

Usually, all web-based email applications are directly open into a web browser. You can open and compose email while opening the web-based email application into a web browser.

You can learn more about web-based email at

https://brainly.com/question/14612394

#SPJ4


Related Questions

waluigi for smash who agrees ​

Answers

Answer:

I do

Explanation:

Well, if i didnt, i wouldn't be part of the internet, now would I?

(can i get brainliest? pls?)

totally i agree-even tho i dont really play anymore

Rebbeca has finished with the research and outline portion of her slide presentation. Now, the next logical step is to begin working on what part of her slide?

Answers

Answer:

The next step is creating the layout and template style

Explanation:

As we know that the power point presentation is used for preparing the slides  i.e. easy for the company to describe them by adding the images, videos with sounds.

As in the situation it is given that the Rebbeca completed with the portion of the research and outline now the next and logical step would be that she could create the layout and the style of the template so that it looks attractive to the audience

Therefore the above represents the answer  

for a large enterprise deploying virtualized servers, what are two benefits of using a bare metal hypervisor solution instead of a hosted hypervisor solution? (choose two.)

Answers

For a large enterprise deploying virtualized servers, the two benefits of using a bare metal hypervisor solution instead of a hosted hypervisor solution include the following:

direct access to hardware resources.

increased efficiency.

What is virtualization?

In Computer technology, virtualization simply refers to the creation of an abstract layer over computer hardware primarily through the use of a software, in order to enable the operating system (OS) such as macOS, storage device, server, etc., to be used by end users over the Internet.

In Cloud computing, some of the components or features which is not required for a successful virtualization environment include the following:

HypervisorsVirtual machineHost machine

In conclusion, the advantages and benefits of deploying virtualized servers through the use of a bare metal hypervisor solution are increased efficiency in the system, as well as direct access to hardware resources.

Read more on hypervisors here: brainly.com/question/28528924

#SPJ1

Complete Question:

For a large enterprise deploying virtualized servers, what are two benefits of using a bare metal hypervisor solution instead of a hosted hypervisor solution?

answer choices

elimination of the need for management console software

addition of an extra layer of abstraction

direct access to hardware resources

enhanced security

increased efficiency

Line spacing refers to the amount of space between each line in a paragraph

Answers

Answer:

yes sir, its just the format of the paragraphs

What type of email communication reaches out to former clients and older prospects and encourages a reply? Strategic email Onboarding email Reengagement email Promotional email

Answers

A type of email communication that reaches out to former clients and older prospects and encourages a reply is: C. reengagement email.

What is an e-mail?

An e-mail is an acronym for electronic mail and it can be defined as a software application (program) that is designed and developed to enable users send and receive both texts and multimedia messages over the Internet.

In Computer Networking, a reengagement email is a type of email communication that is designed and developed to reach out to former clients and older prospects, and it encourages a reply.

Read more on e-mail here: brainly.com/question/15291965

#SPJ1

A library system contains information for each book that was borrowed. Each time a person borrows or returns a book from the library, the following information is recorded in a database.

Name and the unique ID number of the person who was borrowing the book

Author, title, and the unique ID number of the book that was borrowed

Date that the book was borrowed

Date that the book was due to be returned

Date that the book was returned (or 0 if the book has not been returned yet)

Which of the following CANNOT be determined from the information collected by the system?

Answers

The thing that can not be determined from the information collected by the system is the amount of information or content a student studies in the book.

What is Database?

The database may be defined as an organized collection of data stored and accessed electronically. This refers to the set of structured data that is stored in a computer system that can be easily accessed and retrieved for future and current use. There are the following types of databases are there:

Relational database.NoSQL databases.Cloud databases.Columnar databases.Wide column databases.

Therefore, the thing that can not be determined from the information collected by the system is the amount of information or content a student studies in the book.

To learn more about the Database, refer to the link:

https://brainly.com/question/6344749

#SPJ1

Users on your organization's Windows Server 2012 R2 server are beginning to take up excessive disk space on the NTFS volumes. You have plenty of disk space now, but you're concerned about this situation in the future. What can you do

Answers

To address the issue of excessive disk space usage on Windows Server 2012 R2, you can implement disk quotas and regular disk cleanup.


To prevent excessive disk space usage on the Windows Server 2012 R2, you can implement the following measures:

1. Disk Quotas: Enable and configure disk quotas on NTFS volumes. This allows you to set limits on the amount of disk space each user or group can utilize, preventing any single user from consuming excessive space.

2. Regular Disk Cleanup: Schedule and perform regular disk cleanup activities. This includes removing temporary files, emptying the Recycle Bin, and deleting unnecessary system files. You can use built-in tools like Disk Cleanup or third-party utilities to automate this process.

By implementing disk quotas and regularly cleaning up disk space, you can proactively manage disk usage and ensure that the server has sufficient space available for future needs, avoiding potential issues related to excessive disk space consumption.

Learn more about Window server click here :brainly.com/question/14526761

#SPJ11

PLEASE HELP! WILL GIVE BRAINLIEST

PLEASE HELP! WILL GIVE BRAINLIEST

Answers

Answer:

Explanation:find out

what command can be used in the kde version of linux to edit a file?

Answers

The command that can be used in the KDE version of Linux to edit a file is "kate".

The KDE version of Linux includes a text editor called "Kate," which can be used to edit files through a graphical user interface. To use Kate, open the file manager and navigate to the location of the file you want to edit. Right-click on the file and select "Open with" and then "Kate" from the dropdown menu.

This will open the file in the Kate text editor, where you can make any necessary changes and save the file. Alternatively, you can open Kate directly from the Applications menu and then navigate to the file you want to edit within the editor itself.

You can learn more about command at

https://brainly.com/question/25808182

#SPJ11

u What is the full form of DRAM? a) Dynamic Remote Access Memory b) Dynamic Random-Access Memory c) Dependent Remote Access Memory d) Dependent Random-Access Memory

Answers

Answer:

B

Explanation:

Dynamic Random-Access Memory

Which patient is undergoing aquatic therapy with therapeutic exercises? What is the length of the session? Who is the therapist in charge?

a. Tierra Falls, 15 minutes, Bridgette McClain

b. Tierra Falls, 30 minutes, Jonathan Risk

c. Tierra Falls, 30 minutes, Bridgette McClain

d. Robbie Koehler, 30 minutes, Steven Wilder

Answers

The answer is c. Tierra Falls, 30 minutes, Bridgette McClain.

What is aquatic therapy?

Aquatic therapy is a type of physical therapy that involves exercises performed in a pool under the supervision of a licensed therapist. It is a low-impact form of therapy that can help patients recover from a variety of injuries or conditions, including chronic pain, arthritis, and post-surgical rehabilitation.

The patient undergoing aquatic therapy with therapeutic exercises is Tierra Falls, as indicated in options a, b, and c.

The length of the session is 30 minutes, as stated in options b and c. The therapist in charge is Bridgette McClain, as mentioned in option c.

The therapist in charge of Tierra Falls' aquatic therapy session is Bridgette McClain, who is likely a licensed physical therapist or aquatic therapist trained to provide specialized care for patients undergoing aquatic therapy.

McClain will be responsible for designing and supervising Falls' therapy plan, adjusting it as needed to ensure that it is safe and effective for her specific needs.

To know more about therapeutic  visit:

https://brainly.com/question/14598348

#SPJ1

Fill in the blank: Every database has its own formatting, which can cause the data to seem inconsistent. Data analysts use the _____ tool to create a clean and consistent visual appearance for their spreadsheets.

Answers

The tool used by data analysts to create a clean and consistent visual appearance for their spreadsheets is called clear formats.

A database refers to an organized or structured collection of data that is typically stored on a computer system and it can be accessed in various ways. Also, each database has a unique formatting and this may result in data inconsistency.

In Computer science, a clean data is essential in obtaining the following:

Data consistencyData integrityReliable solutions and decisions.

Furthermore, spreadsheets are designed and developed with all kinds of tools that can be used to produce a clean data that are consistent and reliable for analysis.

In this context, clear formats is a kind of tool that is used by data analysts to create a clean and consistent visual appearance for their spreadsheets.

Read more on database here: https://brainly.com/question/15334693

You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should install a personal ______, a program that protects your computer from unauthorized access by blocking certain types of communications. Group of answer choices

Answers

Answer:

You should install a personal firewall, a program that protects your computer from unauthorized access by blocking certain types of communications.

Explanation:

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.

Lucy is trying to decide what sources to use in her literature review. The type of sources Lucy will use in her literature review will depend on which of the following?

Lucy is trying to decide what sources to use in her literature review. The type of sources Lucy will

Answers

The type of sources Lucy will use in her literature review will depend on the type of literature review and the discipline.

What is in the literature review?

A literature review is known to be a form of a detail summary of former research on a topic.

Note that the literature review is one that looks into scholarly articles, books, area of research and as such, the type of sources Lucy will use in her literature review will depend on the type of literature review and the discipline.

Learn more about literature review from

https://brainly.com/question/13708299

#SPJ1

type of website monetizing the horrible working conditions of motherhood, according to vox

Answers

The type of website monetizing the horrible working conditions of motherhood according to Vox is a "mommy blog."

A mommy blog is a type of blog that provides advice, support, and resources for mothers. It can cover a wide range of topics related to motherhood, such as pregnancy, childbirth, child-rearing, and family life. Mommy bloggers often share their own experiences and struggles as mothers, as well as tips and strategies for other mothers who may be facing similar challenges.

These blogs can be a source of inspiration and community for many women who are trying to balance the demands of work and motherhood. Many mommy bloggers monetize their blogs by partnering with brands and advertisers to promote products and services that are relevant to their audience.

For example, a mommy blogger might partner with a baby food company to create sponsored content that promotes their products. Mommy bloggers can also earn money through affiliate marketing, where they earn a commission on sales made through their unique affiliate link.

They may also sell digital products, such as e-books or courses, or offer coaching services to other mothers who are looking for support and guidance. Overall, mommy blogs can be a powerful tool for mothers who are looking for community, support, and advice.

They can also be a source of income for bloggers who are passionate about helping other mothers navigate the challenges of motherhood.

To know more about mommy blog:https://brainly.com/question/29100870

#SPJ11

to print factorial of any
input number
QBASIC​

Answers

Answer:

The program in QBasic is as follows;

PRINT "Number: "

INPUT N

LET FACT = 1

FOR I = 1 TO N

     FACT = FACT * I

NEXT I

PRINT FACT

END

Explanation:

This prompts user for number

PRINT "Number: "

This accepts input from the user

INPUT N

This initializes the factorial to 1

LET FACT = 1

This iterates through the number the user inputs and calculates its factorial

FOR I = 1 TO N

     FACT = FACT * I

NEXT I

This prints the factorial

PRINT FACT

The program ends here

END

how often should you backup the data on your computer

Answers

It is highly recommended to backup your computer data on a regular basis in order to prevent the loss of important data due to a system crash or hardware failure.

The frequency of backups depends on the amount and type of data that needs to be backed up and the importance of the data.

For example, if you work with sensitive data, it's important to backup your data daily or every time there is a change. On the other hand, if you don't use your computer much and have minimal data stored on it, you might only need to backup your data once every few weeks or months.

Some people prefer to backup their data once a week, while others prefer to backup their data daily. It ultimately depends on your own personal preferences and how important your data is to you. Regardless of how often you choose to backup your data, it's important to store the backup in a secure location, such as an external hard drive or cloud storage.

Learn more about backups at

https://brainly.com/question/30826635

#SPJ11

help plz (will give brainliest)

help plz (will give brainliest)

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This is the python program in the question that is:

def sum(n1,n2):

n=n1+n2

return n

The question is: write a function CALL that displays the return value on the screen.

So, the correct program is written below:

*********************************************************************  

def sum(n1,n2):# it is function that define sum

 n=n1+n2 # variable n that store the result of n1 and n2

 return n # return the result

print(sum(3,5))# call the sum function with parameter 3 and 5 , it will print 8

print(sum(4,101))

# call the sum function with parameter 4 and 101 it will print 105

********************************************************************************

you can also store the sum result into another variable, because this function return the sum. So, you can store that return value into another vairable and using the print function, to print the value of this variable such as:

*****************************************************************************

def sum(n1,n2):# it is function that define sum

n=n1+n2 # variable n that store the result of n1 and n2

return n # return the result

result= sum(6,9) # store the sum result into another variable i.e result

print(result)# print the result variable value

*****************************************************************************

Write the working principle of a computer and explain it. ​

Answers

Explanation:

The process in which computer takes data as an input , process them and provides the result to the user which is called working principal of computer......

The working principal of computer are :

Input = This is the first step of computer working in which computer takes raw data from the user through input devices such as keyboard, mouse etc and provides in computer understandable form for processing....

Processing = The second step of computer working in which computer's processor ( CPU ) process the data based on predefined set of instructions...

Output = This is the next step of computer in which the computer displays the output as meaningful information through output devices such as monitor , printer etc...

Storage = This is another step of computer working in which the computer stores the processed information permanently on storage device such as hard disk , CD/DVD etc...

Answer:

the working principle of computer are :-

Explanation:

Input = this is the first step of computer working in which come to take raw data from the user through input device such as a keyboard mouse etc and provides in computer understandable form for processing

Process = this is the second step of computer walking in which computers processor CPU processes the input data based on predefined set of instruction .after processing data is send them to aap put device under the supervision of control unit Output = this is the next step of computer walking in the computer display the output at meaningful information through output device such as monitor printer etc .

Storage = this is the another is type of computer working in which the computer is the process information permanently on storage device other hard disk CD DVD etc

the bracing working principle of computer can make clearly from the above given figure ☝️☝️

 Write the working principle of a computer and explain it.

I need help with this :(( In java
Write a program that has a user guess a secret number between 1 and 10.

Store the secret number in a variable called secretNumber and allow the user to continually input numbers until they correctly guess what secretNumber is.

For example, if secretNumber was 6, an example run of the program may look like this:

I'm thinking of a number between 1 and 10.
See if you can guess the number!
Enter your guess: 4
Try again!
Enter your guess: 3
Try again!
Enter your guess: 1
Try again!
Enter your guess: 10
Try again!
Enter your guess: 6
Correct!
Note:
Make sure that the the secretNumber is 6 when you submit your assignment! It will only pass the autograder if the value is 6.

Answers

Java is an object-oriented coding software used to develop software for a variety of platforms.

What does programmer do in Java?

When a programmer creates a Java application, the compiled code is compatible with the majority of operating systems (OS), including Windows, Linux, and Mac OS.

For writing a program that has a user guess a secret number between 1 and 10 it can be done as follows:

import random

secretNum = random.randint(1,10)

userNum = int(input("Take a guess: "))

while(userNum != secretNum):

   print("Incorrect Guess")

   userNum = int(input("Take a guess: "))

print("You guessed right")

Thus, by using this program, one can execute the given condition.

For more details regarding Java, visit:

https://brainly.com/question/12978370

#SPJ1

Jason is using his mother's computer. He plugs in his flash drive, but it does not appear in the explorer window. Suggest what Jason can try to resolve the problem.​

Answers

Answer:

Try plugging the flash drive into a different port.

Explanation:

There could be a problem in his flash drive or his mother's computer may not be able to read the flash drive.

Implement the frame replacement algorithm for virtual memory
For this task, you need to perform the simulation of page replacement algorithms. Create a Java program which allows the user to specify:
the total of frames currently exist in memory (F),
the total of page requests (N) to be processed,
the list or sequence of N page requests involved,
For example, if N is 10, user must input a list of 10 values (ranging between 0 to TP-1) as the request sequence.
Optionally you may also get additional input,
the total of pages (TP)
This input is optional for your program/work. It only be used to verify that each of the page number given in the request list is valid or invalid. Valid page number should be within the range 0, .. , TP-1. Page number outside the range is invalid.
Then use the input data to calculate the number of page faults produced by each of the following page replacement algorithms:
First-in-first-out (FIFO) – the candidate that is the first one that entered a frame
Least-recently-used (LRU) –the candidate that is the least referred / demanded
Optimal – the candidate is based on future reference where the page will be the least immediately referred / demanded.

Answers

To implement the frame replacement algorithm for virtual memory, you can create a Java program that allows the user to specify the total number of frames in memory (F), the total number of page requests (N), and the sequence of page requests.

Optionally, you can also ask for the total number of pages (TP) to validate the page numbers in the request list. Using this input data, you can calculate the number of page faults for each of the three page replacement algorithms: First-in-first-out (FIFO), Least-recently-used (LRU), and Optimal.

To implement the frame replacement algorithm, you can start by taking input from the user for the total number of frames (F), the total number of page requests (N), and the sequence of page requests. Optionally, you can also ask for the total number of pages (TP) to validate the page numbers in the request list.

Next, you can implement the FIFO algorithm by maintaining a queue to track the order in which the pages are loaded into the frames. Whenever a page fault occurs, i.e., a requested page is not present in any frame, you can remove the page at the front of the queue and load the new page at the rear.

For the LRU algorithm, you can use a data structure, such as a linked list or a priority queue, to keep track of the most recently used pages. Whenever a page fault occurs, you can remove the least recently used page from the data structure and load the new page.

For the Optimal algorithm, you need to predict the future references of the pages. This can be done by analyzing the remaining page requests in the sequence. Whenever a page fault occurs, you can replace the page that will be referenced farthest in the future.

After processing all the page requests, you can calculate and display the number of page faults for each algorithm. The page fault occurs when a requested page is not present in any of the frames and needs to be loaded from the disk into memory.

By implementing these steps, you can simulate the frame replacement algorithm for virtual memory using the FIFO, LRU, and Optimal page replacement algorithms in your Java program.

To learn more about virtual memory click here:

brainly.com/question/30756270

#SPJ11

You would apply a ________, which is a collection of design choices that includes colors, fonts, and special effects used to give a consistent look to your work.

Answers

You would apply a Theme, which is a collection of design choices that includes colors, fonts, and special effects used to give a consistent look to your work.

What is said to be Theme?

A theme is known to be a kind of a mix up or the combination of some set of colors, fonts, as well as visual effects.

It is one that a person can be able to use to tell about their slides as a kind of consistent, professional appearance.

Therefore, You would apply a Theme, which is a collection of design choices that includes colors, fonts, and special effects used to give a consistent look to your work.

Learn more about special effects  from

https://brainly.com/question/1262098
#SPJ1

A single decalaration statement can declare an array of characters and an array of integers.

True or False

Answers

answer: i think it’s true

Which code results in a ValueError?

int('seven')
float(2.5)
int(7)
8 / 0

Answers

Answer:

Int(‘seven’)

Explanation:

Took one edg

Answer: int('seven')

The guy above is correct.

How are computer networks connected?

Answers

Answer:Computer networks connect nodes like computers, routers, and switches using cables, fiber optics, or wireless signals. These connections allow devices in a network to communicate and share information and resources. Networks follow protocols, which define how communications are sent and received.

Explanation.

hope this helped you find what your looking for

Computer networks connect nodes like computers, routers, and switches using cables, fiber optics ,or wireless signals. These connections allow devices in a network to communicate and share info and resources

Information that is sent across a network is divided into chunks called __________.

Answers

Answer:

Packets

Explanation:

for which of the following would a control chart for attributes not be appropriate? a. number of rotten apples b. length of metal rods c. proportion of broken eggs in a carton d. number of nonfunctioning light bulbs e. number of complaints issued

Answers

A control chart for attributes would not be appropriate for measuring the number of complaints issued. Complaints are subjective and the quality of the complaint cannot be determined in the same way that the number of rotten apples, length of metal rods, proportion of broken eggs in a carton, and number of nonfunctioning light bulbs can.

Control charts for attributes, also known as a P chart, measure proportions or percentages and are used to monitor the quality of a product. They measure the frequency of a nonconforming item, such as the number of rotten apples, length of metal rods, proportion of broken eggs in a carton, or number of nonfunctioning light bulbs.

In comparison, complaints are qualitative. There is no single standard for a complaint, as the quality of the complaint is based on the perception of the individual making it. Therefore, a control chart for attributes would not be appropriate for measuring the number of complaints issued.

for more such questions on carton

https://brainly.com/question/24423116

#SPJ11

What does the Flippy Do Pro show about representing very small numbers?

Answers

Answer:

it shows number that is near the target figure, but not the actual figure

Explanation:

What Flippy Do Pro reveal about representing a very small number is a number that is near the expected number in value. This is because Flippy Do Pro would not reveal some particular lesser numbers in their precise value.

However, this often results in roundoff blunder, which is mostly caused by the inability of bit compositions to depict the outcome of numbers as it should precisely be.

Any application that wants to be displayed on the web must use the HTTP protocol
True
False

Answers

Answer:

true

Explanation:

Other Questions
Complete the identities. 1+cot= who does Kim K play in the Paw Patrol movie What nerve is connected to tooth nerve? technician a says good terminal connections will resist corrosion. technician b says the terminal can be either crimped or soldered to the conductor. who is correct? 5. For each pair of shapes, decide whether or not Shape Ais congruent to Shape B.Explain your reasoninga. First pairsb. Second pair:BFirst Pair (A) - Yes, CongruentFirst Pair (A)- No, Not CongruentSecond Pair (B)- Yes, CongruentSecond Pair (B)- No, Not Congruent A HORIZONTAL line passes through point (-3,-1). Find the equation of this line.please help i will mark brainliest A student is failed due to 10 marks after obtaining 90 marks in full marks of 250. what percentage marks does he require to pass? a group interview is designed to uncover leadership potential among the applicants and to see how they interact with others. true or false A student makes three plots of their data and finds that a plot of [A] vs t is linear, a plot of ln[A] vs t is non-linear, and a plot of 1/[A] vs t is non-linear. What is the rate law of the reaction? Rate = k Rate = k[A] Rate = k[A]2 Rate = k[A]3 Helium-neon laser light (=632.8nm) is sent through a 0.300-mm-wide single slit. What is the width of the central maximum on a screen 1.00m from the slit? Sameer plans to make smaller bags of potatoes from a 10kg bag.he buys a 10kg bag from the market at R62.00 and plans on making up smaller 500g bags to sell. Calculate what thecost price of each 500g bag would be. Freight costs paid by a seller on merchandise sold to customers will cause an increase. Which expression is equivalent to128x8y329 ? Assume y20 and 220.2x2z8yz4x?yz2x28x*yz* /2yz64x*yz^_2yz light wood framing used nominal lumbar that is at its smallest dimension. (True or False) The mean price of non fiction books is $22.18, the standard deviation is $3.69 mehrotra ml, petersen ml, geng eh. understanding hiv program effects: a structural approach to context using the transportability framework. j acquir immune defic syndr. 2019;82 suppl 3:s199- s205. the only religions practiced in africa are christianity and voodoo truefalse In a research study of a one-tail hypothesis, data were collected from study participants and the test statistic was calculated to be t = 1.664. What is the critical value (= 0.01, n_1 = 12, n_2 = 14) What is absolutism tied to? plzzz make a sentence with the word Colonialism in it???