The domain is an email message tell you the

Answers

Answer 1
The domain is an email message tell you the destination's location.

The domain is the part of the email following the "@" symbol. For example, if the email is "example@xxx.com", then the domain is "xxx.com"
This part is usually telling you to where you are sending your email.

Related Questions

You live "out in the middle of nowhere" and feel there is no need to protect your internet connection because there is no one that lives near you. one day you are unable to connect to the internet. after calling tech support you find that someone has hacked into your router and has changed all the settings. fortunately the hacker only wanted to use your internet connection and did not view any information on your computer. your decision to leave your router unprotected risked the integrity of the information on your computer. select yes or no.

Answers

Users reside "inside the middle of nowhere" and think that and no need to secure their connection to the internet so nobody lives next door, and the further discussion can be defined as follows:

In this, the user can't access the internet one day, upon calling technical assistance, we discover that someone has hacks through the router and altered all of its settings. Fortunately, the hacker was only interested in your internet access and did not look at any of your computer's data. So, the choice to leave your connection unencrypted exposed yourself to hazards to authenticity on your computer's data.

Therefore, the given statement is "False".

Learn more:

brainly.com/question/20376495

The protocol that resides at the ____ layer in the tcp/ip protocol suite is called internet protocol (ip).​

Answers

Internet layer if i'm correct

Productivity software that provides you with the ability to create, spell-check, edit, and format is considered ____ software.

Answers

The Answer Is : Word Processing

"because data in a computer can be easily accessed and modified, that presents a challange for the investigators of a computer crime. what method is used to make sure the files the investigator have have not been changed from their original state found in the crime computer

Answers

"Because data in a computer can be easily accessed and modified, that presents a challenge for the investigators of a computer crime. what method is used to make sure the files the investigator have not been changed from their original state found in the crime computer: Answer: Compare the hash values of the files the investigator has with the original of the crime computer

What is the ratio between total bits required for such a cache implementation over the data storage bits?

Answers

Answer: [ 128 * (32*8 + 20 + 1) ] / [ 128 * (32*8) ] = 277/256

What is a series of instruction or commands that a computer follows; used to create software

Answers

A program is an established set of instructions that a computer tracks to perform a task. The program is put into a storage area manageable to the computer and memory can also comprise the information that the instruction operates on. The computer program changes to one instruction and accomplishes it and then gets the following instruction. Programs can be considered as interactive or batch in relations of what drives them and how constantly they run. An interactive program obtains data from an interactive user or perhaps from another program that put on an interactive user. A batch program tracks and does it work and then stops and can be in progress by interactive users who appeal their interactive program to run the batch program.

In addition to narrative form, experimental or avant-garde films may use ______ or ______ form.

Answers

In addition to narrative form, experimental or avant-garde films may use Abstract or Associational form.

The abstract form organizes entire films around shapes, sizes, colors and movements in the images. Abstract films can seen completely random. And associational form in which the films parts are exposed to suggest similarities, contrast, concept, emotions and express qualities.

Access points take ________ from wireless devices and send them on to devices on the wired lan.

Answers

Access points take packets from wireless devices and send them on to devices on the wired LAN.

When you modify or delete data present in a database, you are ________?

Answers

When you modify or delete data present in a database, you are processing the database.

Using ____ involves writing down all the steps you will use in a program.

Answers

Using a flowchart involves writing down all the steps you will use in a program

If a protocol is routable which tcp/ip layer does it operate at\

Answers

Layer 3, the Network Layer, just like the OSI model.

The ampacity of a No. 12 aluminum wire with RHW insulation installed in a raceway that has 19 other wires is

A. 7 A.
B. 5 A.
C. 10 A.
D. 15 A.

Answers

Final answer:

The ampacity of a No. 12 aluminum wire with RHW insulation installed in a raceway with 19 other wires is most accurately 7 A, as the NEC dictates derating to 50% for more than 9 conductors, which is 7.5 A. We typically select the nearest standard size of overcurrent protection device below this value, giving us 7 A in this case.

Explanation:

The student is asking about the ampacity of a No. 12 aluminum wire with RHW insulation when installed in a raceway with 19 other wires. The term ampacity refers to the maximum current an electrical conductor can handle before deteriorating under the heat caused by electrical resistance, which is an important consideration in electrical wiring installations. According to the National Electrical Code (NEC), the base ampacity of No. 12 aluminum wire is generally 15 amps. However, when multiple wires are bundled together, as in a raceway, the ampacity must be derated due to the reduced ability to dissipate heat.

For 4-6 current-carrying conductors, the NEC suggests derating to 80%, 7-9 to 70%, and more than 9 to 50%. Therefore, with 20 conductors, the ampacity would be derated to 50% of 15 A, which is 7.5 A. But in practice, we use the nearest standard size of overcurrent protection device below the ampacity after derating, which usually brings us to either 7 or 5 amperes. Options 10 A and 15 A would be too high and disregard the need for derating. Thus, the most accurate answer, based on NEC guidelines, would likely be 7 A. Still, official guidelines and local regulations should be consulted to determine the exact ampacity as it may vary based on specific conditions.

Based on the NEC guidelines, the ampacity for No. 12 aluminum wire with RHW insulation must be derated when in a raceway with multiple wires. Normally, it is 15 A, but with 20 wires, it would typically be derated to 80%, which closest matches option A, 7 A.

The ampacity of a No. 12 aluminum wire with RHW insulation installed in a raceway with other wires will be de-rated according to the National Electrical Code (NEC). The NEC provides a table for the allowable ampacities of conductors, but they must be adjusted when multiple conductors are bundled together, as they generate more heat and can handle less current.

For No. 12 aluminum wire with RHW insulation, the typical ampacity is 15 A when not in a bundle. However, the NEC states that for more than 3 wires in a conduit, the ampacity must be derated to 80% of this value. Since there are a total of 20 wires in this case, the ampacity would have to be derated further.

Unfortunately, the question does not provide the exact de-rating factor needed for a bundle of 20 wires; the NEC must be consulted directly for specific de-rating factors. Nevertheless, the closest answer from the provided options, based on the typical 80% de-rate, would be 7 A (Answer A).

To create a multi-column and multi-row box for users to type into in an html form, use the ____________ tag pair

Answers

To create a multi-column and multi-row box for users to type into in an html form, use the <textarea></textarea> tag pair.

The html tags are the codes or the hidden keywords in the web browser to tell about its format and displayed content. The html tags mostly comes in pairs, pair consist of the start tag and end tag.

The tiny memory cards used by digital cameras and mobile devices are an example of ____ storage.

Answers

The tiny memory cards used by digital cameras and mobile devices are an example of Solid State storage.

What port does rdp use by default and from what range of numbers should you select a private port number?

Answers

The default RDP port is 3389 but can be configured in the range of 49152-65538

By default, RDP (Remote Desktop Protocol) uses port 3389. For selecting private port numbers, you should use the range from 49152 to 65535.


Remote Desktop Protocol (RDP) is a network protocol used to remotely connect to another computer. By default, RDP uses port 3389. This port number acts like an apartment number in a building, making sure that traffic is directed to the correct application on a server.

When selecting a private port number, it's crucial to choose from the range of 49152 to 65535, which is known as the dynamic or private port range. These port numbers are not assigned to any specific services and are available for any application to use.

Ports play a significant role in how applications communicate over networks, with different ports designated for different services like HTTP (port 80) and FTP (port 21), although these can sometimes be customized by administrators as needed.

E-mail is ________ communication, which means users do not have to communicate at the same time.

Answers

I'm pretty sure the answer would be "Asynchronous" communication. 

Answer: Asynchronous

Explanation:

Asynchronous communication is not based on clock signal rather the communication takes place in non -regular manner by specific synchronized clock.Texting, blogging, vlogging,emailing etc are the examples of asynchronous communication.This can take place from different place at any time.Therefore, E-mail is example of asynchronous communication which permits user to communicate through mails at any point of time

When troubleshooting vpn connectivity, which windows and linux command can you use to verify your internal port?
a.ping
b.traceroute
c.lookup
d.ipconfig?

Answers

The answer is ping = A; 

For each processor find the average capacitive loads.

Answers

For each processor find the average capacitive loads. Answer use Pefrmon and select CPU Tab (see attachment).

The term _____ best describes the level of technology skills needed in today’s business world.

Answers

The answer is fluency.

Write a program that reads in two integers and determines if the first is a multiple of the second. [hint: use the modulus operator.]

Answers

# Written in python

isMult = False


a = int(input("Enter an integer: "))
b = int(input("Enter an integer: "))

if a % b == 0:
    isMult = True
    print(a, "is a multiple of" , b")
    

A broadcast network is one in which a transmission from any one attached station is received by all other attached stations over a shared medium. examples are a bustopology local area network, such as ethernet, and a wireless radio network. discuss the need or lack of need for a network layer (osi layer 3) in a broadcast network

Answers

Broadcast frames are layer 2 and not Layer 3, examples are DHCP/ARP/RARP etc.  request.  A Router will block all broadcast traffic unless configured to let the specific packet through via the IP Helper statement to direct to a remote DHCP server and back.
Obviously, a bus topology this is OLD technology they rarely exist anymore. Today, switches have taken over the dumb hubs or even vampire taps on a coax cable. However, a broadcast it still passed on to every port on the switch, unless configured not to do so. Anyway, I could go on and on.

Gps receivers are commonly used by individuals to determine their geographic location while hiking and to obtain driving directions while traveling.
a. True
b. False

Answers

I think it is true also.

The acronym is used to define the process that allows multiple devices to share a single routable ip address.

Answers

The answer is Mac Address
media access control address 

On the Picture Tools Layout tab, you can preview results of the numerous styles, borders, effects, and layouts by _______ commands.

Answers

 

By single-clicking commands, you can preview results of the borders, numerous style, layouts, and effects, on the Picture Tools Layout tab.

 

You may observe that when you select a picture as you work, a new tab will display above the Format tab – which is the Picture Tools tab. A special set of commands that are exclusive for pictures will be available on the Ribbon once this tab displays.


A lot of Microsoft Office applications contain this option, such as the popular document editing application, Microsoft Word. Today, the most recent version of the Microsoft Office suite is the Office 2016 for Windows and MacOS.

"omr, ocr, and micr are all types of ________."

Answers

OMR, OCR and MICR are all types of character and mark recognition devices. They are scanners that are able to recognize special characters and marks.
OMR stands for Optical Mark Recognition,which senses the presence or absence of a mark.
OCR stands for Optical Character recognition, which reads special preprinted characters by light source.
MICR stands for Magnetic Ink Character Recognition, where  machine reads character made of ink containing magnetized particles.

Answer:

recognition/reader devices

Explanation:

Glass, rubber, porcelain, and paper are examples of electrical A. conductors. B. insulators. C. grounds. D. batteries.

Answers

B.Insulators I think
The correct answer here is B. Insulators because an insulator is a material that does not conduct electricity well. The examples here are perfect examples of insulators.

What is the windows server 2012 feature that enables you to maintain previous versions of files on a server, so that if users accidentally delete or overwrite a file, they can access a copy?

Answers

Volume Shadow Copies, although VSS has been around since Windows 2003, it just needed to be configured just as in 2008/2012/2016.

Modify secondverse to play "the name game" (a.k.a. "the banana song", see wikipedia.org), by replacing "(name)" with username but without the first letter. ex: if username = "katie", the program prints:

Answers

I guess you need to write it using C++, so here's your solution:
int main() {   string secondVerse = "Banana-fana fo-f(Name)!";   string userName = "Kattie";
   userName.erase(userName.begin());
userName.resize(userName.length()); secondVerse = secondVerse.replace(secondVerse.find("(Name)"),6 ,userName);
cout << secondVerse << endl;

 return 0;
}

 "userName.erase(userName.begin());" - this one removes first letter of the name.

The ________ is one of a number of major internet interconnection points that serve to tie all the isps together.

Answers

The Internet Exchange Point (IXP) is one of a number of major internet interconnection points that serve to tie all the ISPs (Internet Service Providers) together. This point is a physical infrastructure that allows ISPs to interconnect via several paths. Having more paths improves routing efficiency. 

Marie uses a browser to visit a blog. What is the unique identifier of the blog?

Answers

it would be the Website which contains the URL of the blog
the website.............
Other Questions
Select 2 examples of reactive languageI can'tI'll do itThere's gotta be a wayI chose toYou ruined my day A ship at sea, the Gladstone, spots two other ships, the Norman and the Voyager, and measures the angle between them to be 44. The distance between the Gladstone and the Norman is 4510 yards. The Norman measures an angle of 36 between the Gladstone and the Voyager. To the nearest yard, what is the distance between the Norman and the Voyager? ~~20 Points~~ If c is a constant such that x^2+25x+c is equal to the square of a binomial, then what is c? Based on chapter 5 The Adventures of Huckleberry Finn, which best describes why the novel is considered a realist work? What is the probability of getting either a sum of 5 or at least one 5 in the roll of a pair of dice? Antes, la familia lvarez (cenar) a las ocho de la noche. de ni?a, yo (cantar) en el coro de ni?os de san juan. cuando vivan en la costa, ustedes (nadar) por las ma?anas. mis hermanas y yo (jugar) en un equipo de bisbol. la novia de ral (tener) el pelo rubio en ese tiempo. antes de tener la computadora, (t) (escribir) a mano (by hand). (nosotros) (creer) que el concierto era el mircoles. mientras ellos lo (buscar) en su casa, l se fue a la universidad. At the swim club, what is the ratio of men to all members?A 1:3B 3:4C 1:2D 4:1 A rare form of mineral that is usually very clear and brightly colored a(1)=20 a(n)=a(n1)17 Find the 3rd term in the sequence How does culture emerge as humans live out the Christian mandate what is a n exposition of a story The largest ethnic group in Singapore is __________, while the largest ethnic group in Indonesia is __________. A. Chinese . . . Javanese B. Chinese . . . Tai C. Tai . . . Khmer D. Khmer . . . Chinese What is the initial value of y=-2x-5 Puto pueros libros __________. i think that the boys read (present tense) the books. entry 1: point value: 3.0 points question 2 puto eos litteras ___________.i think that they will read the letters. entry 1: point value: 3.0 points question 3 puto puellas libros __________. i think that the girls are reading the books. entry 1: point value: 3.0 points question 4 putavi discipulos libros __________. i thought that the students were reading the books. entry 1: point value: 3.0 points question 5 putavi milites libros __________. i thought that the soldiers had read the books. entry 1: point value: 3.0 points question 6 puto litteras a pueris __________. i think that the letters are being read by the boys. entry 1: point value: 3.0 points question 7 puto puellas libros __________. i think that the girls will read the books. entry 1: point value: 3.0 points question 8 puto litteras a eis __________. i think that the letters have been read by them. entry 1: point value: 3.0 points question 9 putavi libros a militibus __________. i thought that the books had been read by the soldiers. entry 1: point value: 3.0 points question 10 putavi libros a militibus __________. i thought that the books were being read by the soldiers. entry 1: point value: 3.0 points Buenos Dias,senora ruiz. Como esta Give a summary of the guidelines for using sunscreen to prevent overexposure Who used the technique of horizontal integration to dominate the American steel industry in the late 1800s? Which of the following is a method used to prevent soil depletion? a-Dune fencesb- Contour farming c-Adding fertilizersd- Planting grasses on slopesi believe it is b dont know for sure please help It takes Sam 3 hours to do all of the yard work, but it takes his brother Carl only 2 hours. How long, in hours, would take them to do the yard work if they work together?A. 5/6B. 2/3C. 6/5D. 3/2 The first phase of interpersonal psychotherapy for depression involves assessment of the symptoms as well as Steam Workshop Downloader