1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinvika [58]
2 years ago
5

You receive a request for a report on your office’s productivity. How should you respond to that e-mail?

Computers and Technology
1 answer:
ki77a [65]2 years ago
7 0

In the case above, the ways that one need to respond to that e-mail is that:

  • Tell the sender that you have received their e-mail and will work on the report.

Check more about email below.

<h3>What is the email about?</h3>

A response email is known to be a kind of an email that is made reply to another email.

Note that In business, this is said to be a type of email that a person will have to write in regards to  inquiry response email, declining an invitation and others.

Hence, In the case above, the ways that one need to respond to that e-mail is that

  • Tell the sender that you have received their e-mail and will work on the report.

Learn more about  e-mail from

brainly.com/question/24688558

#SPJ1

You might be interested in
3. Which swim_backwards method is called when sammy.swim_backwards() is executed? Why?
Georgia [21]
Classes called child classes or subclasses inherit methods and variables
4 0
3 years ago
Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
liberstina [14]

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

3 0
2 years ago
How does Botnet operate and communicate.
zhuklara [117]

Answer:

 Botnet is typically operate by the internet relay networking and domain. The botnet are generally received specific type of the instruction from the control server.

The main purpose and structure of botnet is basically depend upon the various type of instruction and structure.

The botnet is communicated with the help of IRC ( Internet relay chat) and it is basically communicated with the chat server for transferring the data to the client. The IRC network basically use simple network with low bandwidth for communication with the host of the botnet.

4 0
3 years ago
Help me..and thank you​
kotykmax [81]

Answer:

#include <stdio.h>

void spaces(int n) {

 for(int i=0; i<n; i++) {

   putchar(' ');

 }

}

void numbersdown(int n) {

 for(int i=n; i>1; i--) {

   putchar('0'+i);

 }

}

void numbersup(int n) {

 for(int i=1; i<=n; i++) {

   putchar('0'+i);

 }

 putchar('\n');

}

int main(void) {

 int number;

 printf("Please enter a digit: ");

 scanf("%d", &number);

 for(int i=number; i>0; i--)

 {

   spaces(number-i);

   numbersdown(i);  

   numbersup(i);    

 }

}

Explanation:

I deliberately separated the solution into different functions for readability. If needed, the code could be made much more compact.

7 0
3 years ago
When computer network are joined together they form a bigger network called the​
Airida [17]

Answer:

A WAN can be one large network or can consist of two or more lans connected together. The Internet is the world's largest wan.

Explanation:

8 0
3 years ago
Other questions:
  • When does a kernel panic occur?
    12·2 answers
  • Technician A says that a ratio is a comparison between two values. Technician B says that in a compression ratio, the main value
    5·1 answer
  • During the initiating phase, a project charter authorizes a project to begin. Which of the following elements are included in a
    15·1 answer
  • Which one is a certain sign that a website is not reliable?
    6·2 answers
  • A. Skype offers a service that allows you to make a phone call from a PC to an ordinary phone. This means that the voice call mu
    7·1 answer
  • Consider a system that contains 32K bytes. Assume we are using byte addressing, that is assume that each byte will need to have
    10·1 answer
  • When parallel parking, you should select a space that is __________ as long as your car.
    11·1 answer
  • .When one component modifies an internal data item in anothercomponent we call this:
    7·1 answer
  • Now that you have your file holding your data, you need to analyze the data in three different ways that answer questions you po
    7·1 answer
  • After you set a goal or purpose for your Web site, what is the next step to designing your​ pages​?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!