1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stells [14]
3 years ago
14

email communication has its own set of etiquette guildelines for users to follow if they want to be effectove communicators. whi

ch of these is not of these guidelines
Computers and Technology
1 answer:
Len [333]3 years ago
7 0
Effective not effectove. These are guidelines:
Be brief.
Have a short opening sentence or paragraph that puts the matter in context.
Use the middle paragraph(s) to cover the matter(s) in hand.
Close with a clear agreement of what will be done, by whom, and by when.
You might be interested in
Thinking actively promotes critical thinking. Explain how thinking actively promotes critical thinking
pav-90 [236]

A critical thinker is someone who is actively engaged in a thought process. Active thinking is that process of making judgments about what has happened while critical thinking involves a wide range of thinking skills that eventually leads to a desired outcome. Active thinking prompts learning during complex problems situations and provides learners with an opportunity to think about how a problem will be solved. As a result, it will help them evaluate, analyze, and intercept information.

8 0
3 years ago
Write a program that computes and prints the average of the numbers in a text file. You should make use of two higher-order func
lara [203]

Answer:import functools

# open your file

file = open("integers.txt", 'r')

file = file.read()

# put numbers into a list

file = file.split()

# convert list into integers

file = list(map(int, file))

# use lambda function to get average.

print(functools.reduce(lambda x, y: x+y / len(file), file, 0))

Explanation:

4 0
3 years ago
1. Suppose the memory address in an embedded system has 12 bits. How many unique memory locations can this 12-bit address access
const2013 [10]

Answer:

14 bits memory address - 4096 bits.

16 bits memory address - 16384 bits.

Explanation:

The computer system memory is a hardware component that provides the necessary memory space and location to run software application on the computer system. The memory address location comes in various sizes.

A 14 bit memory can address 2^14 bits which is 4096 bits, since each 14 bit line carries a bit on which line. So for a 16 bit memory address, 2^16 bits location is addressed.

3 0
3 years ago
How does porter’s competitive forces model help companies develop competitive strategies using information systems?
LenKa [72]

Answer:

<h3>Porter's competitive forces model helps companies determine what they should do to be more productive by comparing what their competitors are doing. It also brings the companies costs down and makes them more efficient as a business by using Information Systems.</h3>
7 0
3 years ago
To see the non-printing characters in Writer press ________ + ________keys, together.
Sindrei [870]

Answer:

Ctrl + *

Explanation:

Non-printing characters are the characters that are not displayed at the time of printing of an document or a spreadsheet. This is used for designing a content

The few are examples like non-breaking space, the pilcrow etc

The shortcut to show or hide the non-printing characters is Ctrl + * i.e Contorl + Star

So press these two keys we can see the non-printing characters

8 0
3 years ago
Read 2 more answers
Other questions:
  • The 'client area' of a window is the area used to display the contents of the window (thus a title bar or border would lie outsi
    15·1 answer
  • Ned and mary ann are saving their files to a cd
    15·1 answer
  • A _________ is the broadcast of various types of media over the web.
    10·2 answers
  • To name a computed field, follow the computation with the word ____ and then the name you wish to assign to the field
    8·1 answer
  • When a user utilizes another computer to communicate with a third party, with the result that the third party cannot recognize t
    8·1 answer
  • Assume that an int variable counter has already been declared. Assume further a variable counterPointer of type "pointer to int"
    10·1 answer
  • What command is used to add a reflection or an outline to text
    7·1 answer
  • Consider the following C program: int fun(int *i) { *i += 5; return 4; } 352 Chapter 7 Expressions and Assignment Statements voi
    11·1 answer
  • Jason works for a restaurant that serves only organic, local produce. What
    15·2 answers
  • P.W. Singer jokes about how many people are using Wang computers. What point is he making with this joke?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!