Outline the steps for logging into E-mail account​

Answers

Answer 1

Answer:

go to your email service provider, type in your username(email) and password click the log in or sign in button to continue


Related Questions

how does the va assess the satisfaction of veteran care?

Answers

The VA assess the satisfaction of veteran care by offering them primary care and mental health care.

Who is a veteran?

It should be noted that a veteran simply means an individual that has a long experience in a particular field.

In this case, the VA assess the satisfaction of veteran care by offering them primary care and mental health care.

Learn more about veteran on:

brainly.com/question/303798

#SPJ12

setting a starting value for a variable is called _____________.

Answers

Setting a starting value for a variable is called initializing.

Setting a starting value for a variable is called:

InitializingWhat is Initializing?

Initializing is the act of assigning a value to a given piece of information classified as a variable.

Most times in programming, the starting value of 0 is often assigned to the first value. So, the correct answer is, Initializing.

Learn more about initializing here:

https://brainly.com/question/27230187

#SPJ11

WAP to input the rating of a movie, and print as per the given criteria:
Rating Category
8.0-10 Blockbuster
6.0-7.9 Super Hit
4.0-5.9 Hit
2.0-3.9 Average
<2.0 Flop​
please answer fast

Answers

Answer:

What is the question?

Explanation:

What are 2 ways to send a message to your client when signed in as an accountant user?.

Answers

Answer:

The use of Ask client and request are the two ways to send a message to your client when signed in as an accountant user.

8. When “arc rated” clothing is worn it must allow for what

Answers

When "arc rated" clothing is worn by a worker it must allow for movement and visibility.

What is an arc rated" clothing?

An arc rated" clothing can be defined as a type of personal protective equipment (PPE) that is worn by a worker, so as to protect him or her from arc flash injuries when working on energized equipment and de-energizing equipment.

According to the Occupational Safety and Health Administration (OSHA), when "arc rated" clothing is worn by a worker it must allow for movement and visibility.

Read more on OSHA here: brainly.com/question/17199752

#SPJ1

what are the two different types of dns requests?

Answers

Answer:

Recursive Query - When a DNS Client submits a Query to a DNS Server for name resolution. The response to the DNS Query might be either an answer to the query or an error message. In Recursive Query, if the DNS Server does not have the reply to offer an exact response to the DNS Client, the DNS Server may query other DNS Servers on behalf of the DNS Client.Iterative Query - When a DNS Client requests name resolution from the DNS server, the DNS Server returns the best reply it has. If the DNS Server does not recognize the response to the Client's DNS Query, the answer might also be a referral to another lower level DNS Server. This lower level DNS Server is designated by the higher level DNS Server as the Authoritative DNS Server for the DNS namespace with which the DNS Query is associated. Once the DNS Client receives the referral from the higher level DNS server, it may send a DNS query to the lower level DNS server that received the recommendation.

The two major types of DNS request are as follows;

Recursive Query Iterative Query

What is a domain name system?

Domain name system is abbreviated as DNS.

A Domain Name System (DNS) converts domain names into IP addresses, which allow browsers to get to websites and other internet resources.

Basically,  DNS is a directory of names that match with numbers.

Computer uses IP addresses to communicate, therefore, the DNS convert domain names to IP address for communication.  

The two major types of DNS request are as follows;

Recursive Query - Query that demands a resolution Iterative Query - Query that does not demand a resolution.

learn more on DNS here: https://brainly.com/question/14397200

#SPJ11

you have a windows server 2016 system that you want to use as a dhcp relay agent. which windows server 2016 service would you use to do this?

Answers

You should use Routing and Remote access of the Windows server 2016 service to make the computer system act as a DHCP relay agent.

What is a server?

A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.

In this scenario, you should use Routing and Remote access of the Windows server 2016 service to make the computer system act as a Dynamic Host Configuration Protocol (DHCP) relay agent.

Read more on Windows server 2016 here: https://brainly.com/question/14584088

#SPJ11

What is the primary added value of relational databases over flat files?

Answers

The primary added value (advantage) of relational databases over flat files is an ability of the system to quickly scan large amounts of data.

What is a relational database?

A relational database can be defined as a type of database that is designed and developed to store, structure and recognize relation that are existing between data points and items of information.

In database management system (DBMS), an ability of the system to quickly scan large amounts of data is the primary added value (advantage) of relational databases over flat files.

Read more on database here: brainly.com/question/13179611

#SPJ12

30 POINTS FOR THE ANSWER

Rico is about to send his first professional design project to a printer and he wants to make sure he has not forgotten any of the steps. He decides to do some research on how the colors will look on paper compared to his monitor. After he completes his research, he realizes that having a checklist for each job would help him remember all the steps.


For this discussion, do some research on how printed colors will look compared to colors on your monitor. What possible solutions may work for you to help increase the likelihood that the printed colors will match the monitor colors? After doing that research, create a checklist of the steps involved with preparing a file for printing. Make sure to include items learned in this lesson and what you learned in your research.

Answers

The possible solutions are:

Ask for a printed or click on proof to get the  right color match.One can use Pantone colors as it aids with color matching.

How do one do the above?

Computers is known to often use the same data and it often uses it to bring up clarity or light up pixels on its screen.

Therefore to get the result above, one need to check system preference system setting to get different brightness and color settings.

Therefore, The possible solutions are:

Ask for a printed or click on proof to get the  right color match.One can use Pantone colors as it aids with color matching.

Learn more about printed colors from

https://brainly.com/question/1548113

#SPJ1

An algorithm to find the perimeter of a triangle

Answers

Answer:

step 1- start

step 2- Input a,b,c

step 3 - perimeter = a+b+c

step 4 - Print the perimeter

step 5 - End

Enumerate the 6 main shortcomings the compnents of satellite communication

Answers

The section, installation, and introduction costs, for example, are just too much. a frequency interference. This proliferation and interference run the risk of interfering with communication systems.

What is satellite communication?

The use of artificial satellites to establish communication links between different locations on Earth is known as satellite communication in the field of telecommunications.

The global communications network is not possible without satellite communications.

For instance, the section, installation, and introductory expenses are just too expensive. Interference on frequencies. The communication services may be disrupted as a result of this proliferation and interference.

Hence, the above given are the shortcomings in the components of satellite communication.

To learn more about the satellite communication refer;

https://brainly.com/question/21894964

#SPJ1

A(n) _________ Web page displays customized content in response to keyboard or mouse actions or based on information supplied directly or indirectly by the person viewing the page.

Answers

Answer:

dynamic

Explanation:

A dynamic web page serves out varied material to various visitors while keeping the same layout and appearance. These pages, which are often built in AJAX, ASP, or ASP.NET, require longer to render than plain static sites. They are commonly used to display data that updates regularly, such as weather forecast or market prices.

Dynamic web pages often incorporate software applications for various services and need server-side resources such as databases. A database enables the page builder to divide the design of the website from the content that will be presented to users. When they post material to the database, the website retrieves it in response to a user request.

A field identified in a record as holding the unique identifier for that record is called the::

Answers

A field identified in a record as holding the unique identifier for that record is called the; key field

What is a key field in computer?

A field in computer is a record that holds unique data which identifies that record from all the other records in the file or database

Finally, the correct answer is a key field because it is a field in a record of a data table that contains unique data and separates that record from all other records in the database.

Typical key fields include account number, product code and customer name.

Read more about key field at; https://brainly.com/question/14577288

#SPJ12

Privacy principles need to be balanced against the
private information. Select 2 options.
O financial
ethical
O corporate
D societal
political
benefit that comes from the automated collection of

Answers

In the case above about Privacy principles, the balanced needs to be

Societal.

What does privacy mean?

The presence of informational privacy rights implies that people are said to be  under a duty or not to make known information or to hinder unauthorized use of their information by others.

Note that when Privacy principles is balanced against Societal benefit that comes from the automated collection of private information. , the world will be at peace.

Learn more about Privacy principles from

https://brainly.com/question/10524592

#SPJ1

What should be used to prevent javascript from accessing a session id value?.

Answers

Cookies should be used to prevent javascript from accessing session-id values.

What are cookies?

Cookies are brief text messages that a website you visit sends to your browser.

Web browsers are instructed to only send cookies using encryption using the Secure cookie property.

The session ID can be taken from the user's browser cookies during storage, frequently via cross-site scripting. The session ID may be seen while it's being sent by listening in on network traffic.

Keep in mind that every request to the server includes a session ID. Using the cookie attribute of the Document object,

JavaScript is also capable of manipulating cookies. JavaScript has the ability to read, write, change, and remove cookies that are specific to the current web page.

Hence, cookies should be used to prevent javascript from accessing session-id values.

To learn more about the cookies refer to:

https://brainly.com/question/20263903

#SPJ1

what methods could you use to set up printing in an organization?

Answers

The methods could you use to set up printing in an organization?

One can connect directly to a printer.One can set up a print server.One can use cloud service to set up printers.

What is the aim of printing?

Printing is the act of reproducing text and images  in a lot of quantities through the use of a master form or template.

Therefore, The methods could you use to set up printing in an organization?

One can connect directly to a printer.One can set up a print server.One can use cloud service to set up printers.

Learn more about printing from

https://brainly.com/question/145385

#SP11

The quickbooks online advanced desktop app can be installed on which operating system?.

Answers

Explanation:

For Android products, your device will need to be running Nougat 7.1. 1 or newer.

Which term refers to a shorthand method for identifying network and host bits in an ip address?

Answers

A CIDR Notation is known as the term that refers to a shorthand method for identifying network and host bits in an ip address.

What is CIDR Notation?

This is known to be a term that was devised in 1993 by the IETF. The  CIDR is said to be a  shorthand method for knowing network and host bits in an IP address.

Therefore, one can say that A CIDR Notation is known as the term that refers to a shorthand method for identifying network and host bits in an ip address.

Learn more about CIDR Notation from

https://brainly.com/question/14985928

#SPJ12

ZipCar uses cutting edge wireless technology combined with sophisticated data management and security techniques to assure that its promises of spur-of-the-moment car sharing is ________, streamlined, and safe.

Answers

Answer:

dependable

Explanation:

what are some examples of security goals that you may have for an organization? check all that apply.

Answers

An examples of security goals that you may have for an organization is:  

To protect customer data against unauthorized access.

What is customer credentials about?

The goal of a firm in terms of security is to Safeguards or Defend customer credentials or details.

Therefore, An examples of security goals that you may have for an organization is:  

To protect customer data against unauthorized access.

Learn more about security goals from

https://brainly.com/question/14139033

#SPJ11

which of the following is a mathematical function defined in the sql standard?

Answers

A  mathematical function defined in the SQL standard are:

ABSCEILING DEGREES, etc.

What are math functions in SQL?

Arithmetic functions such as ABS, CEILING, radians are known to be often found in SQL standard .

Note that SQL is said to be a query language set up for management of data that is been saved or held in a RDBMS.

A  mathematical function defined in the sql standard are:

ABSCEILING DEGREES, etc.

Learn more about SQL standard from

https://brainly.com/question/9692465

#SPJ11

Three symptoms of hacking

Answers

Answer:

1. You receive mass emails

2. Your internet searches get redirected

3. Your passwords are not working

Explanation:

Hope it helps

_______________________ variables do not need to be declared inside the function definition body, they get declared when the function is called.

Answers

Formal parameter variables doesn't have to be declared inside the function definition body because they are declared when the function is called.

What is a formal parameter?

A formal parameter can be defined as a type of variable which a programmer specifies when he or she needs to determine the subroutine or function.

This ultimately implies that, formal parameter variables doesn't have to be declared inside the function definition body because they are declared when the function is called.

Read more on function parameter here: brainly.com/question/20264183

#SPJ11

What is the primary motivation of the ""cyber warrior""?

Answers

The primary motivation of the ""cyber warrior"" is to defend computer and information systems, or also to attack the system.

Who is a  cyber-warrior?

This is known to be a person that is said to be involved in cyberwarfare, mostly for personal reasons or based on religious belief or others,

Note that The primary motivation of the ""cyber warrior"" is to defend computer and information systems, or also to attack the system.

Learn more about cyber warrior from

https://brainly.com/question/1460915

#SPJ12

Assume the int variables i, lo, hi, and result have been declared and that lo and hi have been initialized. Write a for loop that adds the integers between lo and hi (inclusive), and stores the result in result. Your code should not change the values of lo and hi. Also, do not declare any additional variables -- use only i, lo, hi, and result. 1 Enter your code

Answers

The loop will be:

int lo, hi, result;

result = 0;

//the loop will be as follows:

for(i = lo; i <= hi; i++)

{

result = i++;

}

What is a loop?

A loop is a sequence of instruction s that is continually repeated until a certain condition is reached.

The above loop means that the integer (i) will start from the value of lo, and stop when the value of i is equal to hi

Learn more about loop on:

https://brainly.com/question/26568485

#SPJ12

The transport layer must break messages from the application layer into several _____ that can be sent to the network layer

Answers

The transport layer must break messages received from the application layer into several packets that can be sent to the network layer.

The layers of the OSI model.

In Computer networking, there are seven main layers in the open systems interconnection (OSI) model and these include the following in a sequential order;

Physical LayerData link LayerNetwork LayerTransport LayerSession LayerPresentation LayerApplication Layer

As a standard, it is a must that the transport layer break messages that are received from the application layer into several packets that can be sent to the network layer.

Read more on transport layer here: https://brainly.com/question/26177113

#SPJ12

Other Questions
What does the word embraced in this sentence from Paragraph 5 explain about voters?Voters feel empowered because they embraced the electoral process.Voters feel an especially strong bond with other people who have voted.Voters enjoy voting along with their loved ones because it makes them feel closer.Accepting the voting process wholeheartedly makes voters feel better about themselves.Some voters come to view voting not just as a duty fulfilled, but as a recreation.A Right and a ResponsibilityWhat does it mean to vote? If you are of age, voting is exercising your right to determine how and who will make laws and enforce those laws on your behalf. When you vote, you determine who has a say-so in the use of tax dollars you contribute to the general welfare of the citizens of your town, county, state, and nation. Voting is not only a right, it is also a responsibility. Voting is a powerful tool that people can use to the benefit or detriment of others.The Constitution of the United States did not originally define who had the right to vote. That determination was left up to the states, and in the majority of states at that time, only white male property owners had the right to vote. Women, people of color, and white males who did not own property had no say-so in the election of government officials. Not all voting rules were the same throughout the states, however, so this made for an interesting electorate. For example, in New Jersey, a white woman could vote if she owned property, and in some northern states, free men of color could vote. Luckily, the framers of the Constitution had the foresight to build into it a means to rectify unjust situations by allowing for the addition of amendments, or additions, to the Constitution. Through amendments, women and free people of color were eventually guaranteed the right to vote.If voting is such a powerful tool, why is there such appalling voter turnout in many elections? People think their vote doesnt count or doesnt matter. Long lines of voters at the polls before sunrise are typical only of big elections, such as the election of a senator or representative to serve in the federal government or the election of a president for the country. But it is the off-year elections, those smaller elections for local and state offices, that should matter most. For the vast majority of the population, the local elections are the ones that touch their everyday lives. It is in these elections that people decide who runs the local school boards, who makes the rules and regulations governing behavior and activities in their locality, and who will judge the population in the local courts. There also may be issues on the ballot that will affect their daily lives that have nothing to do with who the candidate is, but actions will be taken (or not) that will affect them. When a candidate is elected, he or she feels a mandate has been given by the electorate to fulfill promises made to get into office.Who is voting? In some studies and polls, the most active voters are usually more educated and more involved with their communities. This electorate knows the issues and problems, and knows who can and cannot help make the communities better. They read more, listen to others opinions more, and make a decision based on the track record of the person running. They understand that voting is a learned activity, and they want to help those in their communities who do not understand the importance of voting to better understand the process. They get involved with the populace, teaching them the requirements for voting, such as finding the polling place, numbers to call for help, learning their voting optionssuch as early or electronic votingand teaching them the impact voting will have on the issues that they are concerned about.What are other benefits of voting? Some studies have shown that voting can have a psychological effect on the voter. Voters feel empowered because they embraced the electoral process. It gives the participant a sense of satisfaction, almost like saying, I made my voice heard today. I voted. Voting also benefits future generations when children see their parents and other responsible adults exercising their constitutional right to vote and be heard. Voting addresses the future needs of coming generations because the policies put into place by the elected officials will affect lives now and in the future. Low voter turnout in a country that guarantees every eligible citizen over the age of eighteen the right to vote is unacceptable. Every election you are eligible to vote in commands your participation. Make your voice heard. Dont hesitate. Vote! An imaginary element, Y, has two different isotopes.y has a percentage abundance of 25% and 29y has a percentage abundance of75%.Which of the following is the relative atomic mass of Y?26252728 You are a Junior IT Technician in your organisation. One of the duties is to demonstrate and explain how the computer works to new intern stuff. Discuss how you would demonstrate and explain? Why did the Aboriginals stop coming to North America? Which of the following is a slow rise of plastic deformation under the action of shear stresses when it is below the yield strength of the material.a.Brittle Structureb.Ductile fracturec.Creepd.Fatigue Most enlightened despots:A) were tried and executed.B) censored the ideas of the philosophers.C) showed interest in the ideas of the philosophers.D) successfully implemented most of the ideas of the philosophers. if n 18 = find n Need help simple explanation if possible What can be inferred about the Cyclops in this excerpt from Homers Odyssey? "The land of Cyclops first, a savage kind, Nor tamed by manners, nor by laws confined: Untaught to plant, to turn the glebe, and sow, They all their products to free nature owe: The soil, untill'd, a ready harvest yields, With wheat and barley wave the golden fields; Spontaneous wines from weighty clusters pour, And Jove descends in each prolific shower, By these no statues and no rights are known, No council held, no monarch fills the throne; But high on hills, or airy cliffs, they dwell, Or deep in caves whose entrance leads to hell. Each rules his race, his neighbour not his care, Heedless of others, to his own severe." A.The Cyclops is warm and hospitable toward his guests. B.The Cyclops cares for his neighbors well-being and advice. C.The Cyclops does not follow typical rules of the civilized human world. D.The Cyclops can survive only in the deep, dark caves on the island. If you vacillate, do you make immediate and decisive choices?Yes or No Mrs. Andrews asked how a Private Fee - for - Service ( PFFS ) plan might affect her access to services since she receives some assistance for her health care costs from the State . What should you tell her ? Changing the business task involves defining a new _____. what are the three areas on the dashboard that let you find and perform every feature and function you need in quickbooks online? Determine how many kilojoules are absorbed when 341 g of Ca(OH)2 reacts via the following reaction:Ca(OH)2(s)CaO(s)+H2O(l),H=+65.3kJ the patient has a significant visual impairment (category 2) due to astigmatism in the left eye. it is corrected with glasses. the right eye has normal vision. what icd-10-cm code(s) is/are reported? Which word is the best antonym for invincible. a. quickly forgottenb. not athleticc. easily defeated What are the measures of 1 and 2? Show your work or explain your answers. A pyramid has a square base with sides of length s. The height of the pyramid is equal to 1/2 of the length of a side on the base. Which formularepresents the volume of the pyramid?A. V = 1/12 s ^3B. V=1/6 s ^3C. V=1/3s ^3D. V=3sE. V=6s Q6. This part of the question is for simplifying your work: Make a graph and shadow the interested regions of the inequalities in the given picture.The following is the actual question: Find the highest and lowest value of the equation in the given picture within the unshadowed region. which statement best describes the chinese who immigrated to the united states in the late 1800s