1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRINA_888 [86]
3 years ago
13

40 POINTS I NEED THESE ANSWERS ASAP GIVE ME THE RIGHT ASNWER AND ILL PUT YOU AS THE BRAINLIEST

Computers and Technology
1 answer:
Law Incorporation [45]3 years ago
7 0
Having a filling system and keeping a clean desk is good time management tips (True)

Your wrists should be low,relaxed and resting on the frame of the keyboard while typing (False)

A correctly formatted memo will have a complimentary closing? (False)

Which professional business memo part is keyed first?
D.) TO

to type a capital letter "T" the typist will hold the right shift key with the right little finger, and then strike "t" with the left pointer (first) finger. (True)

in a standard block style letter, key the date to print ___ from the top edge of the page
D.) Double space (DS)

A search engine can help link you to information on how to format a buisness letter. (True)
You might be interested in
You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directl
34kurt

Answer:

The answer is "Remote access "

Explanation:

The capacity to access another computer or network that you do not have. Remote computer access provides an employee with remote access to the desktop and file. This assists an employee, for example, who works at home efficiently.

Remote users access documents or other resources on any network-connected device or server, enhancing organizational efficiency and increase there are to cooperate more interact with peers nation.

6 0
2 years ago
Which risk mitigation framework allows scope for research and acknowledgement for risk mitigation?
hjlf
The answer is that by establishing the framework<span> for the management of risks, the basic parameters within which risks must be managed are defined. Consequently, the </span>scope<span> for the rest of the </span>Risk Management<span> process is also set. </span>
6 0
3 years ago
Read 2 more answers
In the belt drive mechanism, what happens when the belt is crossed instead of open?
KengaRu [80]
They will spin in the opposite direction because the belts are twisted.
8 0
3 years ago
To prepare a list of the ten largest cities in Asia, Luke should most likely use data to
kakasveta [241]
He should find answers about the population size hope this helps 
5 0
3 years ago
Read 2 more answers
How can having more than one goal cause truble in the work place
siniylev [52]

Answer:

"Having more than one goal can cause problems at work as it makes it difficult to focus on just one thing and thus can lead to poor results. This is because by having multiple goals there is less concentration, less focus and therefore less ability to accomplish various goals at work with more efficiency and quality."

6 0
2 years ago
Other questions:
  • A(n) _____ allows a user to choose specific files to back up, regardless of whether or not the files have been changed.
    9·1 answer
  • A) What is the maximum value that can be represented as an unsigned n-bit binary integer?
    13·1 answer
  • Your employer is opening a new location, and the IT director has assigned you the task of calculating the subnet numbers for the
    14·1 answer
  • Fill up the blank:- The picture that graphically represents the items you use in Windows is called a/an .......
    5·1 answer
  • What is a characteristic of tasks in Outlook?
    10·2 answers
  • Select the correct answer.
    9·2 answers
  • What was used to enhance silent films of the early 1900s
    15·1 answer
  • Extended essay on globalization not less than 200​
    6·1 answer
  • Which of the following terms means the computer operating system automatically detects and installs the proper driver for a new
    9·1 answer
  • A) Calculate the checksum of following 2 bytes: 00110101 and 10101100, and fill in the blank:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!