1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady_Fox [76]
2 years ago
5

One of the principles of

Computers and Technology
1 answer:
Bas_tet [7]2 years ago
8 0

The fill up for the missing words are:

  • netiquette
  • privacy
  • professional
  • build professional relationships.
  • in person

Check more about netiquette below;

<h3>What is netiquette?</h3>

Netiquette is known to be a term that was said to be made-up  of word gotten from net and etiquette.

Note that  Netiquette often tells about the rules of conduct needed for respectful and appropriate communication that one can use on the internet.

Hence, The fill up for the missing words are:

  • netiquette
  • privacy
  • professional
  • build professional relationships.
  • in person

See full question below

One of the principles of X good communication-------------------- includes protecting

----------------- by taking care of the information you send others by e-mail.

By practicing --------------------------skills in e-mails, you can create a strong professional reputation for yourself.

Sending e-mails is not always the best way to --------------------Sometimes having a

conversation--------------------- is more efficient and friendly.

Learn more about from

brainly.com/question/942794

#SPJ1

You might be interested in
Which type of database program is Microsoft Access 2016?
nadya68 [22]

Answer:

O relational

Explanation:

If I'm wrong I'm so so sorry! But form my research it keeps saying its relational.

If I'm right please give me brainliest I really need it to level up so please help me!

If you don't know how to give brainliest there should be a crown underneath my answer you just have to click it.

Thank you and have a wonderful night,morning,afternoon/day! :D

6 0
3 years ago
Read 2 more answers
Implement a metho d to nd the k-th largest element in an array of size N using a minimum priority queue (MinPQ). Assume that the
diamong [38]

Sorry don't understand spanish,I am sure you can get it wrong,for crying out loud you people get checks for coming to United States

3 0
3 years ago
Explain what the problems with the implementation of the function are, and show a way to fix them.// return true if two C string
Nataly [62]

Answer:

The code is not dereferencing the pointers. You have to place an asterisk in front of the pointer to read the value the pointer points to.

Explanation:

So "if (str1 != str2)" must be "if (*str1 != *str2)".

likewise:

   while (*str1 != 0 && *str2 != 0)

and

     result = (*str1 == *str2);

7 0
3 years ago
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most preci
Slav-nsk [51]
The containment strategy prevents intruders from removing information assets from the network, and prevents attackers from using the organization's network as a launch point for subsequent attacks.
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most precise strategy possible, starting with <span>blocking a specific IP address. Correct answer: C

</span>

8 0
3 years ago
What are the process of boots up a computer?​
Sindrei [870]

Answer:

in computer booting is the process of starting a computer it can be initiated By hardware such as button press or by a software command after it is switched on a computer central processing unit ( CPU)

3 0
3 years ago
Other questions:
  • Write in general about ergonomic injuries and also mention the symptoms that computer users exhibit when they experience these s
    11·2 answers
  • The length of time the valve is open, expressed in degrees of crankshaft rotation, is called camshaft A. overlap.B. lobe separat
    6·1 answer
  • You have created a number of different documents using several applications including word, excel, and powerpoint. these files a
    10·1 answer
  • What is the need for using secondary memory devices?
    5·1 answer
  • What are the benefits of using a multiview sketch to communicate a design?
    11·1 answer
  • Which of the following is a definition of conventions?
    8·1 answer
  • .doc What is the difference between a skilled hacker and an unskilled hacker, other than skill levels? How does the protection a
    5·1 answer
  • Go in my discord server Code is . (CebjBXN)​
    10·2 answers
  • Which of the following are TRUE? A function can call another function. As long as the function is defined anywhere in your progr
    14·1 answer
  • PLEASE HELP ME WITH MY UNIT TEST!!!!!!!!!!!!!! I'M STRUGGLING AND I AM ESPECIALLY STUCK ON THIS ONE!!!!!!!!!!!!!!!!!!!!!! FOR BR
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!