1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanzania [10]
4 years ago
15

You are writing an email to a potentional employer about a job opportunity. What can you do to make sure the email reflects your

intelligence?
Computers and Technology
2 answers:
Nataliya [291]4 years ago
7 0

Answer:big fat fart

Explanation: yea your dealing with some wet and gushy

Lina20 [59]4 years ago
4 0
You want to use proper etiquette and be polite, do not call them by their first name and always refer to them as Mr., or Mrs. Use an extended vocabulary and do not talk about yourself.  If you have proper grammar, depending on the job, that can be seen as intelligence. And always use an appropriate closing that is respectful. Such as, Sincerely, John Doe.
You might be interested in
Write a program that reads a floating-point number from the user and prints "zero", "positive" or "negative"
Lorico [155]
```
#!/usr/local/bin/python3

foo = float( input( "Enter a number: " ) )
if( foo < 0.0 ):
    print( "negative" )
elif( foo > 0.0 ):
    print( "positive" )
else
    print( "zero" )

exit( 0 )
```

3 0
3 years ago
______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
Kitty [74]

Answer:

"IP security" is the correct answer for the above question.

Explanation:

  • "IP security" is a set of rules or protocols which are used for the communication of the network.
  • It is a protocol that is used to encrypt the data which is needed to transfer on the network.
  • It provides security for the communication and it encrypts the data which is needs o transfer on the network.
  • The above question asked about the term which is used for encryption and security. So the answer is "IP security", which is defined above.
7 0
4 years ago
Read 2 more answers
Judy is searching for files with a .jpg file extension on her laptop. Which type of file is she looking for?
nikklg [1K]
<span>JPEG files </span><span> are a common file format for digital photos and other digital graphics so she would be looking for a picture

</span>
6 0
3 years ago
Read 2 more answers
How many typefaces should you use in business documents?
Assoli18 [71]
It’s best to use two
5 0
3 years ago
Read 2 more answers
A form that dedicates a page for each item retrieved for a case; it allows investigators to add more detail about exactly what w
gregori [183]

Answer:

Single-evidence form​

Explanation:

Single-evidence form​  dedicates a page for each item retrieved for a case; it allows investigators to add more detail about exactly what was done to the evidence each time it was taken from the storage locker.

4 0
4 years ago
Other questions:
  • You're trying to decide which disk technology to use on your new server. the server will be in heavy use around the clock every
    10·1 answer
  • How to analyze time complexity of a code?
    5·1 answer
  • Why might you need to convert a file to another file type?
    14·1 answer
  • To what device, inside the computer, do all other devices connect
    10·2 answers
  • What can be used to provide a checklist of user tasks that must be included in the interface design?
    6·1 answer
  • What is "social
    13·2 answers
  • Which of the following is the most effective password?
    15·2 answers
  • It's safe to download files from the internet if u perform regular Windows security updates, that is all u need to protect your
    10·2 answers
  • What is a statement that adds 1 to the int j when the int counter has a value less than the int n?
    12·1 answer
  • What is the acronym DOS in full
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!