1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marysya12 [62]
3 years ago
15

In a block-style business letter, the paragraphs are double-spaced and indented. True or False

Computers and Technology
2 answers:
Sav [38]3 years ago
5 0
I am pretty sure it is true
larisa [96]3 years ago
5 0

Answer:

False

Explanation:

When preparing a business letter,  we have several layout options. Among them, block style is the most common type of business letter layout.  In a block-style business letter, the entire text within a paragraph is single-spaced and aligned to the left.  We will only see double space appears between the paragraphs but not the text within each of the paragraphs.  

You might be interested in
Write the definition of a function divide that takes four arguments and returns no value . The first two arguments are of type i
Nastasia [14]

Answer:

#include <iostream>

using namespace std;

void divide(int numerator, int denominator, int *quotient, int *remainder)

{

*quotient = (int)(numerator / denominator);

*remainder = numerator % denominator;

}

int main()

{

int num = 42, den = 5, quotient=0, remainder=0;

divide(num, den, &quotient, &remainder);

 

return 0;

}

Explanation:

The exercise is for "Call by pointers". This technique is particularly useful when a variable needs to be changed by a function. In our case, the quotient and the remainder. The '&' is passing by address. Since the function is calling a pointer. We need to pass an address. This way, the function will alter the value at the address.

To sum up, in case we hadn't used pointers here, the quotient and remainder that we set to '0' would have remained zero because the function would've made copies of them, altered the copies and then DELETED the copies. When we pass by pointer, the computer goes inside the memory and changes it at the address. No new copies are made. And the value of the variable is updated.

Thanks! :)

8 0
3 years ago
A lack of financial literacy can cause you to lose your
Marianna [84]

Answer:

Financial literacy of someone's ability to understand and apply financial skills, including budgeting, financial management, investing and risk calculation. However, lack of financial literacy may result in opposite of having financial literacy.

Explanation:

Financial literacy of someone's ability to understand and apply financial skills, including budgeting, financial management, investing and risk calculation. Financial literacy helps individuals in taking financial decisions in achieving self-sufficient financial stability.  Financial literacy is the skill of someone about making financial decisions. This skill can help a person to develop a financial roadmap about what he earns, how he will earn, what he spends and what he saves and owes.

Lack of financial literacy can cause to loose your:

  • making effective financial planning
  • making the right decision about budgeting
  • ability to calculate interest
  • understanding the time value of money.

Financial illiteracy can cause you to lose your money or become victims of predatory lending, fraud, subprime mortgages, paying high-interest rates, bankruptcy or potentially resulting in bad credit.

The lack of financial literacy can lead to owing large amounts of debt and making poor financial decisions. For example, the advantages or disadvantages of fixed and variable interest rates are concepts that are easier to understand and make informed decisions about if you possess financial literacy skills.

4 0
3 years ago
A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
joja [24]

Indicators of compromise enable system administrators and information security professionals to detect intrusion attempts or malicious activities.

Your information is incomplete as the options aren't provided. Therefore, an overview of indicators of compromise will be given.

Indicators of compromise means the pieces of forensic data that are found in files or system log entries to identify malicious activity on a network or system.

Indicators of compromise help IT and information security professionals to detect malware infections, data breaches, etc. Examples of indicators of <em>compromise</em> include log-in red flags, unusual outbound network traffic.

Read related link on:

brainly.com/question/25522987

8 0
3 years ago
The Internet and World Wide Web allow almost any business to be global. What are two important results of this process?
lubasha [3.4K]

Answer:

The two Important results of any business to be global is given below.

Explanation:

1.The Internet and World Wide Web allowing the easier and quicker way to getting started any business due to this we can sell the product online and make the business global.

2.The Internet and World Wide Web giving the quicker way to change the business if any changes are reflected in the business environment.

6 0
4 years ago
Jeff gave a presentation that attempted to convince stockholders to purchase the new software he had developed. What type of pre
Travka [436]

Answer: Progress report presentation

Explanation: Progress report presentation is the presentation that consist the progress report of an individual's work .It describes about the project/work that a person has started to complete the project. These reports are made for the clients, students, colleagues etc.

Progress report in this case is made for the client to make them understand about the Jeff's work , his contribution, changes he invoked in it, achievements ,completion of the project, benefits of it etc. This presentation will encourage the client to buy the software made by Jeff.

7 0
4 years ago
Other questions:
  • Which of the following are examples of the concept of layered access in physical security? Select one: a. Firewall, IDS, CCTV b.
    11·2 answers
  • Which of the following could not be represented by columns in the SPSS data editor? a. Levels of between-group variables. b. Lev
    11·2 answers
  • Jane, a marketing manager for the Grocery SuperStore retail chain, fired up a computer program that gave her ready access to inf
    6·1 answer
  • A computer with a frequency 2 GHZ and its average cycle per instruction is 2. what is the MIPS of the computer?
    6·1 answer
  • what are the Technologies in regarding of communication technology? Please help me I'll rate you as brainliest!​
    13·1 answer
  • Importance of spread sheets​
    8·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    12·2 answers
  • What specific job usually includes the important pre-production step of making the
    12·1 answer
  • IF YOU WANT NICELY ENGLISH MUSIC ADD MY W.h.a.t.s.A.p.p nomber <br>+60 199094836​
    5·1 answer
  • You have been asked to replace a cracked screen on a laptop. The replacement screen was delivered today, but it did not include
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!