1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alona [7]
3 years ago
15

Raymond has to send a number of large documents to his charterer accountant for filing his taxes. Which email etiquette should R

aymond adhere to when sending the email with attachments?
To follow email etiquette, Raymond needs to send his emails in( blank)
Computers and Technology
2 answers:
muminat3 years ago
8 0

Answer:

Compress the file and ask when would be the right time to send

call to make sure it was received.

Explanation:

For every email that contains a large document should compress first. If it includes some images, then compress the images in any software using Microsoft and any other. If the document contains some sheet, then compress them and reduce size because email does not accept a format that is larger than 10MB. 10MB of attachments are okay. Try to compress the file and convert it into pdf for better use.

CaHeK987 [17]3 years ago
4 0

Raymond should compress the files, and then at the very least ask what would be the appropriate time to email the attachment. It is important to practice good etiquette when using email. If you are sending an email that has attachments, always make sure to mention it in the body of the email. Raymond should also ZIP or compress his large attachments before sending them. This will make them easier to send.

You might be interested in
Your internet is out, and devices connected by WiFi and ethernet will not connect. You check several websites, and all your pack
tiny-mole [99]

Answer:

a) Open the DNS settings on your router and try using a different DNS.

Explanation:

The DNS or domain name service is a protocol that majorly assigns a URL string to an IP address. This is because the IP address as a number is easily forgotten.

In the question above, the operator could not access the websites with the URL name but can confirm connectivity to the site with its IP address. This means that the IP address can be used to access the websites directly, so, the DNS protocol is either not configured or is down.

6 0
2 years ago
Your disaster recovery plan calls for backup media to be stored at a different location. The location is a safe deposit box at t
butalik [34]

Answer:

Perform a full backup once per week and a differential backup the other days of the week.

4 0
2 years ago
Software (often on firmware) designed to make physical products and devices smarter by doing things like sharing usage informati
Katarina [22]

Answer:

Embedded System

Explanation:

Embedded System are designed to make physical products and devices and helping in diagnose problems as well.

3 0
3 years ago
Match each statement from the passage with the message it represents.
Serggg [28]

Answer:

Here is the answer:

4 0
3 years ago
Does Someone own a fennec on Rocket League and can trade it and is on the Switch?
wlad13 [49]

Answer:

YES

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    12·1 answer
  • Assume a 8x1 multiplexer’s data inputs have the following present values: i0=0, i1=0, i2=0, i3=0, i4=0, i5=1, i6=0, i7=0. What s
    8·1 answer
  • ____ is an object-oriented programming language from Sun Microsystems which allows small programs called applets to be embedded
    13·1 answer
  • find all breweries that specialize in a particular beer style. A brewer is considered specialized if they produce at least 10 be
    5·1 answer
  • Two technicians are discussing the voltage measurements taken on the circuit below: V1 = 12Volts; V2 = 12Volts; V3 = 0Volts; V4
    11·1 answer
  • Determine the number of cache sets (S), tag bits (t), set index bits (s), and block offset bits (b) for a 40964096-byte cache us
    15·1 answer
  • In a folder hierarchy, the top level is referred to as which of the following?
    7·1 answer
  • Which two options are negotiated via ncp during the establishment of a ppp connection that will use the ipv4 network layer proto
    7·1 answer
  • Your program will be used by many departments at the university. Your comments will be important to their IT people. What would
    15·1 answer
  • What line of business (L'Oréa)?​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!