1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masya89 [10]
2 years ago
15

Which e-mail netiquette rules did the student break? check all that apply.

Computers and Technology
1 answer:
abruzzese [7]2 years ago
6 0

The e-mail netiquette rules that the student broke are:

  • Always proofread before sending.
  • Identify yourself by name.
  • Do not reveal personal information.

<h3>What are the email netiquette rules?</h3>

This is known to be the rules for email etiquette and they are:

  • The use of a clear, professional subject words.
  • Always Proofread all email that you send.
  • Compose the email before entering the recipient email address and others.

The e-mail netiquette rules that the student broke are:

  • Always proofread before sending.
  • Identify yourself by name.
  • Do not reveal personal information.

Learn more about etiquette from

brainly.com/question/2528165

#SPJ1

You might be interested in
You have been asked to write a program that will ask the user for his or her pizza order and display it. The order will include
Dvinal [7]

Q asks to write

1. input statement that prompts the user for the type of cheese:

What kind of cheese you like?

Input TYPE OF CHEESE

2. Print statement that clearly displays the output message related to the type of cheese:

Print "Pizza has" TYPE OF CHEESE "type of cheese."


5 0
3 years ago
Charles Mott works for a company called VeriSign that acts a trusted third party to verify information. One of Charles' largest
balu736 [363]

Answer:

Option (B) i.e., Certificate authority is the correct option to the following question.

Explanation:

The following option is correct because it an organization or company who validating the identification of that object that exists and it also verifies the information of the third party.

Option A is incorrect because it is the tool or software that protects the system from the outsiders or the malware.

Option b is incorrect because Online certificate is issued for any software or application or the certification in the field of study.

8 0
3 years ago
3 Points
Setler [38]

Answer:

olpt software

Explanation:

4 0
3 years ago
Read 2 more answers
Select all statements that correctly describe the ramifications of important features supported by modern DBMS.
lara [203]

Answer:  

"Option b and Option d" is the correct option for this question.

Explanation:

In the database, datatype belongs to the information storage medium, which can hold a specific type of value. There are several data types, which is used in database like integer, character, series, floating-point and array numbers, and the rules, that give levels of security to information are known as a security constraints. It may be either developed as rules on integrity, mathematical formalism rules or schematic rules, and other choices were wrong which can be described as follows:

  • In option a, The asserts, which is in any exchange in a database, should only modify the information, that is effected in acceptable ways is called consistency, that's why it is wrong.
  • In option c, The validity and accuracy of the data in the database can not be ensured, that's why it is wrong.
3 0
3 years ago
Which of the following has allowed computers to have more memory capabilities without making them extremely expensive Virtual me
lina2011 [118]

Virtual memory may provide a reasonably large storage capacity in an affordable cost.

<u>Virtual Memory:</u> the operating systems of all modern computers have virtual memory where a disk is used to transfer the data temporarily from the RAM when physical memory of the computer falls short. Though it is cheap but it does not allow computers to have more memory and frequent swapping even makes the PC slow.

<u>Tiered memory:</u> has the fastest data storage and even has a good storage capacity but is pretty expensive.

<u>Volatile memory:</u> volatile memories have good performance in terms of speed and storage but they still are a little expensive in comparison to non-volatile memory.

<u>Non-volatile memory:</u> they do not provide with large storage capacities.

7 0
4 years ago
Other questions:
  • Which keyboard feature is a form feed character?
    14·1 answer
  • Danielle is looking for information on an accounting principle for class. She does not want to sift through a lot of information
    14·1 answer
  • A collection of facts can be copyrighted, but only if the collection is ____ in a way that causes the resulting work to rise to
    14·1 answer
  • An Einstein Analytics team wants to create a dashboard that displays values from an external, on-premise Oracle Database. What a
    7·1 answer
  • Suppose that class OrderList has a private attribute double cost[100] which hold the cost of all ordered items, and a private at
    14·1 answer
  • Write a Java program that generates a new string by concatenating the reversed substrings of even indexes and odd indexes separa
    5·1 answer
  • Given that Apache and Internet Information Services (IIS) are the two most popular web application servers for Linux and Microso
    10·1 answer
  • All NATE specialties are offered at two levels, A. journeyman and master. B. installation and service. C. apprentice and journey
    7·1 answer
  • A popular database software program called ____ offers a wizard and QBE tool to help build and generate SQL queries
    9·1 answer
  • What is assembler? What is Compiler?What is interpreter?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!