1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRINA_888 [86]
3 years ago
13

40 POINTS I NEED THESE ANSWERS ASAP GIVE ME THE RIGHT ASNWER AND ILL PUT YOU AS THE BRAINLIEST

Computers and Technology
1 answer:
Law Incorporation [45]3 years ago
7 0
Having a filling system and keeping a clean desk is good time management tips (True)

Your wrists should be low,relaxed and resting on the frame of the keyboard while typing (False)

A correctly formatted memo will have a complimentary closing? (False)

Which professional business memo part is keyed first?
D.) TO

to type a capital letter "T" the typist will hold the right shift key with the right little finger, and then strike "t" with the left pointer (first) finger. (True)

in a standard block style letter, key the date to print ___ from the top edge of the page
D.) Double space (DS)

A search engine can help link you to information on how to format a buisness letter. (True)
You might be interested in
A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or
Korolek [52]

Answer:

- agitator hacktivist

Explanation:

There are various terms which are described below:

activist cyber: when a person uses online campaigning by non-violation means like social media or other online platforms to create their activism is known as activist cyber.

agitator hacktivist: when a person uses illegal ways to bring change in political point by hacking or theft the information from the internet or bring the system down is known as agitator hacktivist.

ethical hacker: when a person uses legal ways to make a system safe from any type of malicious attack by removing the weakness of the system is known as the ethical hacker.

cybersquatter: when a person buys a domain name with the vision of selling it to the company needed it at very high prices, it is known as a cyber squatter.

so, according to the scenario the most appropriate answer is agitator hacktivist.

4 0
3 years ago
To create a formula in ___ you would first click in one of the cells. A.word b.excel c.facebook d.powerpoint
guajiro [1.7K]
The correct anwser is excel 
7 0
3 years ago
Components that enhance the computing experience, such as computer keyboards, speakers, and webcams, are known as
never [62]

Answer:

- Peripheral devices

Explanation:

Peripheral devices are defined as computer devices which are not the element of the essential/basic computer function. These devices can be internal as well as external and are primarily connected to the computer for entering or getting information from the computer. For example, the keyboards or mouse functions to enter data into the computer for processing and receiving information while the output devices like speakers, projectors, printers, etc. are used to get the information out of the computer.

3 0
3 years ago
Where is the thesis statement usually located in research paper?
Ugo [173]
The thesis statement is typically located in the last sentence of the first paragraph of a research paper.
7 0
3 years ago
What is a fixed expense<br> everfi
Gelneren [198K]

Answer:

A fixed expense is an expense that has a constant total expense value (the total amount of the fixed expense) that remains the same (does not change) when there is a change in the number being managed, manufactured, or sold

Examples of fixed  expense includes; depreciation of assets, salaries of workers, payment for rental lease, and some utility payment, such as road users toll fees payment at a toll gate

Explanation:

8 0
2 years ago
Other questions:
  • What daily life problems does the algorithm quicksort solve?
    14·1 answer
  • Only business writing requires an editing stage
    8·1 answer
  • What is the purpose of a scatter plot introduction to computer applications
    6·2 answers
  • Create a style rule for the page body that sets the width to 95% of the browser window ranging from 640 pixels up to 960 pixels.
    11·1 answer
  • Does anybody know if that apple watch is actually worth what it costs?
    9·2 answers
  • Question 16 of 20
    12·2 answers
  • Computers are designed with what type of memory?
    13·1 answer
  • What soft ware can you use to erase all of your data from a hard drive safely
    13·1 answer
  • What makes someone an expert? What potential issues are there with this?
    10·2 answers
  • Which of the following statements is NOT
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!