1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gizmo_the_mogwai [7]
3 years ago
8

Does anyone know the answer to this question??

Computers and Technology
1 answer:
Ket [755]3 years ago
6 0
The type of letter they are looking for is an Inquiry Letter. 
An Inquiry letter asks questions or elicits info from the recipient. They would include what they are looking for or what they need to know about. They should include any info to reach back to them. 
You might be interested in
The _________________ creates international guiding principles for computer forensic examiners.
motikmotik
<h3>International Organization on Computer Evidence (IOCE)</h3>

The <u>International Organization on Computer Evidence (IOCE)</u> creates international guiding principles for computer forensic examiners.

Computer crime detection and other computer-related evidence issues are among the responsibilities of the International Organization on Computer Evidence (IOCE), a non-profit organization formed in 1995 to facilitate communication between international law enforcement authorities.

<em>Hope this helps :)</em>

3 0
1 year ago
Lesley wants to develop web pages. Which of these programming languages is useful in the context of web design?
Sergeeva-Olga [200]
Php, hope this helps :)
4 0
2 years ago
You are in the windows power shell window and decide to encrypt folder which of the following command do you use
aleksklad [387]

Answer:

try this script bro

(Get-ChildItem –Path C:\Folder).Encrypt()

Explanation:

simply microsoft just use encrypt() & decrypt() words in script to act doing the method encrypting & decrypting.

but i suggest you to use the windows gui features , its more easier. just right click on your folder target , go to properties then click advanced button , checklist encrypt box.

7 0
2 years ago
Recovery after a disaster involves installing the most recent ________ backup copy.
KonstantinChe [14]
The term that would best complete the given statement above is the word "DIFFERENTIAL". Here is the complete statement. <span>Recovery after a disaster involves installing the most recent DIFFERENTIAL backup copy. Hope this answers your question. Have a great day!</span>
8 0
2 years ago
Type dig www.example A in order to get the IP address of www.example. What’s the TTL of the A record returned in the response? W
fiasKO [112]

Answer:

Your computer now has the IP address of that website cached, and no longer has to lookup the IP address of that domain name. The TTL of the first query is bigger than the TTL of the second query as less time was taken to execute the request.

Explanation:

On the first request to the website, the computer needs to contact other machines to find the record of the IP address.

On the second request, the computer already has the IP address and can use that to connect.

6 0
3 years ago
Other questions:
  • What is the one common feature that ties together different social media technologies? All of the social media tools we use toda
    5·2 answers
  • What registry file contains installed programs' settings and associated usernames and passwords?​?
    13·1 answer
  • What error, if any, is in the following code?
    11·1 answer
  • A computer program that senses when another computer is attempting to scan or access a computer or network is called an
    7·1 answer
  • By placing the chorale melody in the highest voice and using a simple harmonization, bach made it easier for congregation member
    5·1 answer
  • Write an application named Perfect that displays every perfect number from 1 through 10,000. A number is perfect if it equals th
    5·1 answer
  • What is computer sences​
    6·1 answer
  • Mention the generation we have in computer​
    7·1 answer
  • Why are control components necessary in traditional software and generally not required in object-oriented software?​
    11·1 answer
  • Write a program that repeatedly takes integers from the user as long as he
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!