1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stells [14]
3 years ago
14

email communication has its own set of etiquette guildelines for users to follow if they want to be effectove communicators. whi

ch of these is not of these guidelines
Computers and Technology
1 answer:
Len [333]3 years ago
7 0
Effective not effectove. These are guidelines:
Be brief.
Have a short opening sentence or paragraph that puts the matter in context.
Use the middle paragraph(s) to cover the matter(s) in hand.
Close with a clear agreement of what will be done, by whom, and by when.
You might be interested in
Which of the following is a professional organization in the field of IT? Society for the Prevention of Cruelty to Animals (SPCA
Lelu [443]
(IEEE) Is the obvious answer ; no harshness meant in any way
7 0
3 years ago
Read 2 more answers
Match the definition
Katen [24]

Answer:

¿???????????? SORRY..........

8 0
2 years ago
A (n) _____, similar to a trojan horse, installs monitoring software in addition to the regular software that a user downloads o
galina1969 [7]

Answer:

Spyware

Explanation:

Internet is a type of computer network that allow device communicate with each other world wide. So, it is not the correct option.

Worm: this is a standalone malware computer program that replicates itself in order to spread to other computers. It spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage. The major feature of a worm is ability to replicate on it own. So, it is not the correct option.

Bot: this is a software application that runs automated tasks. So, it is not the correct option.

Middleware: this is software that lies between an operating system and the applications running on it, enabling communication and data management. It provides services to software applications beyond those available from the operating system. So, it is not the correct option.

Spyware: this is the correct answer. Spyware is similar to trojan horse because it hides itself in a system and a user may not know that it exist on the system. Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information without knowledge of the user.

5 0
3 years ago
Read 2 more answers
The diagram shows the parts of a computer. In which part is data processing done?
notsponge [240]
  • control unit mainly processes tasks and most resources are managed here in the computer system.

  • central processing unit, ( CPU ) where most of the data processing is done and executes instructions.
3 0
2 years ago
In a construction company, a new system has been in place for a few months and now there is a list of possible changes/updates t
Vitek1552 [10]

Answer:

A) corrective.

B) adaptive.

C) perfective.

Explanation:

Making changes due to an error is corrective, making changes in order to be able to accommodate new methods is adaptive, and changes in strict adherence to regulations must be perfective.

8 0
2 years ago
Other questions:
  • An authenticated user can add up to how many computer accounts to the domain, by default
    6·1 answer
  • Need Help ASAP!
    14·2 answers
  • If you specify a user without specifying a hostname, mysql will
    13·1 answer
  • In the accompanying figure, the split double arrow mouse pointer____.
    7·1 answer
  • A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simul
    8·1 answer
  • In a Java Script language. create a two-dimension array consisting of numbers representing costs. After creating the array, prin
    11·1 answer
  • 1. What type of malware is triggered by a specific condition, such as a specific date or a particular user account being disable
    6·1 answer
  • Which of the following did you include in your notes?
    7·1 answer
  • I need the answers. i don’t get this
    11·1 answer
  • How many 60 KB jpeg files can be stored on a 2 MB folder in your hard drive?​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!