1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masya89 [10]
2 years ago
15

Which e-mail netiquette rules did the student break? check all that apply.

Computers and Technology
1 answer:
abruzzese [7]2 years ago
6 0

The e-mail netiquette rules that the student broke are:

  • Always proofread before sending.
  • Identify yourself by name.
  • Do not reveal personal information.

<h3>What are the email netiquette rules?</h3>

This is known to be the rules for email etiquette and they are:

  • The use of a clear, professional subject words.
  • Always Proofread all email that you send.
  • Compose the email before entering the recipient email address and others.

The e-mail netiquette rules that the student broke are:

  • Always proofread before sending.
  • Identify yourself by name.
  • Do not reveal personal information.

Learn more about etiquette from

brainly.com/question/2528165

#SPJ1

You might be interested in
I want to work with LDAP. what is LDAP?
pychu [463]
It's an internet protocol (Lightweight Directory Access Protocol) used to fetch data from servers.
5 0
3 years ago
Read 2 more answers
Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current
Nonamiya [84]

Answer:

The correct answer for the given question is an option(b) i.e java.

Explanation:

Java is an object oriented programming language that is mostly used for the creating the websites.Java is most secure and reliable programming language than the other programming language.

C is a programming language but it is not object oriented programming language thats why this option is incorrect.

Visual basic is a Programming language it is also used to create a web page but it is not commonly used to create a web page  thats why this option is incorrect.

The scheme is not used to create a web page  thats why this option is also incorrect.

7 0
3 years ago
Eva is the network architect for her company's large cloud deployment; she has interconnected her private cloud to a community c
ivann1987 [24]

Answer:

The appropriate response is "Cloud bursting".

Explanation:

  • A strategy for the implementation of a program in a proprietary cloud or network infrastructure that explodes onto a public cloud if availability or production for computational power increases, could be considered Cloud bursting.
  • It enables extra cloud capabilities throughout cases where additional facilities have been required.
6 0
2 years ago
Explain how to install Microsoft Office Suite.
kupik [55]

Answer:

Explanation:

Download and install Microsoft Office applications

1. Log into your Microsoft Office 365 portal. ...

2. In the top right corner, click Install Office apps.

3. Select Office 2016. ...

4.  If prompted, click the Save File button, to allow the download.

5. The install file will download to your computer.

6. When you launch the new applications, log in with your Office 365 email address and password.

3 0
3 years ago
Technology progress so new needs can be satisfied
snow_lady [41]

Yes, that is definitely true.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which type of communication is usually handwriten
    11·2 answers
  • Consider the following method: public double doubleVal(double x) { return x *2; } The following code segment calls the method do
    6·1 answer
  • Advantages of heading attributes
    5·1 answer
  • For each 8-bit data frame the layer uses a generator polynomial G(x) = x4+x2+ x+1 to add redundant bits. What is the sequence of
    11·1 answer
  • Which of the following does your textbook recommend for preparing PowerPoint slides? Group of answer choices
    9·1 answer
  • After conducting interviews with several bad candidates, Althea, a manager at Langrover Inc. interviewed a candidate who was bet
    15·1 answer
  • Someone please help will mark as brainliest
    8·2 answers
  • Write a function named last_digit that returns the last digit of an integer. For example, last_digit(3572) should return 2. It s
    5·1 answer
  • Universal Containers wants to use a sandbox with real data in it. Which Sandboxes three would you recommend?
    11·1 answer
  • Where can formatting features be found ?! Need help asp !‍♀️
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!