1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alex41 [277]
4 years ago
11

You are angry at a friend who forgot to meet you for lunch, and you decide to write an e-mail about how it made you feel. What s

hould you do before you send the e-mail? (Site 2)
Computers and Technology
2 answers:
gtnhenbr [62]4 years ago
6 0
Definitely talk to them irl and if it doesn't work email them and try to work things out or before talking to them tell a trusted adult about how it made it feel
zhuklara [117]4 years ago
4 0
You should think about it and maybe talk to your friend before saying something mean.
You might be interested in
"In about 100 words, describe the idea behind software as a service (SaaS). In your answer, include at least three examples of e
Mama L [17]

Answer:

Explanation:

Saas refers to software as a service and can also be called software on demand .

It Isa software that is deployed over the internet rather than requiring to install an application .It offers different devices such as pay as you go , subscription model and service on demand model .

Only a compatible browser is needed to access the software .

Electronic packages or components that aree offered as an Saas

1)Shopify

2)Big commerce

3)Slack

3 0
4 years ago
Gross Domestic Product is equivalent to which of the following?
Bingel [31]
Gross income absolutely
3 0
3 years ago
A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is
lakkis [162]

Complete Question:

A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Group of answer choices

A. scanning

B. subrogation

C. delegation

D. targeting

Answer:

A. Scanning.

Explanation:

A step commonly used for Internet vulnerability assessment includes scanning, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Internet vulnerability assessment can be defined as the process of defining, analyzing, measuring, identifying, classification and prioritization of vulnerabilities in network resources used to access the internet. The main purpose of an internet vulnerability assessment is to provide necessary informations or data about the threats being posed to an individual or organization through the use of a scanning program or system such as a network security scanner

7 0
3 years ago
Find the value of 1/2 of 1/2​
sveta [45]

Answer:

1/2 of 1/2​ is 1/4 <em>or </em>0.25

Explanation:

7 0
3 years ago
Read 2 more answers
What does eco driving mean
Elena-2011 [213]

Answer:

Explanation:

Eco driving is the the practice of driving in such a way as to minimize fuel consumption and the emission of carbon dioxide.

8 0
3 years ago
Other questions:
  • What is requirement analysis
    8·1 answer
  • What is cloud storage?​
    11·1 answer
  • If you sort by Last Name, Ascending, which of the following last names would come first in the list?
    11·2 answers
  • 1. What is Computer Hardware?
    14·1 answer
  • Importance of spread sheets​
    8·2 answers
  • Write a program which will enter information relating to a speeding violation and then compute the amount of the speeding ticket
    14·1 answer
  • How do I change my name on my Brainly Profile?
    15·2 answers
  • What breakthrough in sound recording facilitated stereophonic recording? Ο Α. overdubbing O B. multitrack recording O C. digital
    10·1 answer
  • ওয়ার্ড প্রসেসিং এ একটি সাধারন ডকুমেন্ট প্রিন্ট করার পদ্ধতি বর্ননা কর?answered
    8·1 answer
  • What is one example of the use of an infrared sensor?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!