1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masya89 [10]
3 years ago
15

Which e-mail netiquette rules did the student break? check all that apply.

Computers and Technology
1 answer:
abruzzese [7]3 years ago
6 0

The e-mail netiquette rules that the student broke are:

  • Always proofread before sending.
  • Identify yourself by name.
  • Do not reveal personal information.

<h3>What are the email netiquette rules?</h3>

This is known to be the rules for email etiquette and they are:

  • The use of a clear, professional subject words.
  • Always Proofread all email that you send.
  • Compose the email before entering the recipient email address and others.

The e-mail netiquette rules that the student broke are:

  • Always proofread before sending.
  • Identify yourself by name.
  • Do not reveal personal information.

Learn more about etiquette from

brainly.com/question/2528165

#SPJ1

You might be interested in
(08.03 MC) Maya is a senior in high school and would like to pursue a career in web design. She needs more information about wha
lora16 [44]

Answer:

Career resource website

Explanation:

In this case, Maya needs a career resource website as it would help her with the necessary information about the skills and educational level required to pursue a degree in web design. A career resource website is a website that has tips and articles on several areas of career enhancement and counselling services. However, some offer these services for a fee.

4 0
3 years ago
Read 2 more answers
Is phone data used when connected to wifi
finlep [7]
I do not think so, no.
7 0
4 years ago
Refer to the exhibit. The web servers WS_1 and WS_2 need to be accessed by external and internal users. For security reasons, th
BigorU [14]

Answer:

c.Ports Fa3/1 and Fa3/2 on DSW1 will be defined as secondary VLAN isolated ports. Ports Fa3/34 and Fa3/35 will be defined as primary VLAN promiscuous ports.

Explanation:

Primary VLANs which can only be reached by using promiscuous port, comprises of the gateway and isolated VLANs for users to get out of a network.

The isolated ports can only communicate i.e send and receive data with the promiscuous ports; Fa3/34 and Fa3/35.

Also, WS_1 and WS_2 can neither send nor receive data with the data server, thus we isolate them.

3 0
4 years ago
I think my knee....
SIZIF [17.4K]

Answer:

Explanation:

is broken.

4 0
3 years ago
which server edition doesn't support any server roles that you would typically use with standard version
ioda

On the standard version of Microsoft Windows, Dynamic Host Configuration Protocol Server and Hyper-V Remote Access are two roles that aren't supported on Azure Virtual Machines - a type of server.

<h3>What is a Server?</h3>

It is to be noted that this is a computer device (hardware) or virtual environment (software) that feeds another computer with special services.

<h3>Type of Server</h3>

The following are various types of servers:

  • Webserver
  • Proxy Server
  • Virtual Machine (VM)
  • Database Server
  • Mail Server

See the link below for more about Servers:

brainly.com/question/25435769

8 0
3 years ago
Other questions:
  • Write a single c statement to read an integer from the keyboard and assign it variable "num"
    6·1 answer
  • What type of traffic always goes to all devices in a subnet?
    10·1 answer
  • ________ means that IT capacity can be easily scaled up or down as needed,which essentially requires cloud computing. A) agility
    15·1 answer
  • What does the hard disk drive do?
    9·2 answers
  • In order to delete an object, it must be?
    14·1 answer
  • A peer-to-peer (p2p) network is an example of ________ administration
    5·1 answer
  • A user has requested a field that counts the number of child records associated with a custom object. These custom objects have
    5·1 answer
  • VURULU<br> The default style in Word is called the
    6·1 answer
  • Write a Java program that prompts the user for an int n. You can assume that 1 ≤ n ≤ 9. Your program should use embedded for loo
    5·1 answer
  • How can you create a messages to look like an IMessage?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!