1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
3 years ago
8

Why would you copy an individual instead of listing that name on the To line?

Computers and Technology
2 answers:
Eva8 [605]3 years ago
5 0

Answer

When the person is not directly involved in the message but has a need to know about it.

Explanation

Even though the person really doesn't need the information in your correspondence, and you don't expect him to answer you or take any action, you still want him to know that you're doing your job, and how you're handling this matter, and you want him to have the information available if he wants to see it.


kvv77 [185]3 years ago
3 0

When you send a letter or an email to somebody in the course
of your job, you might copy your boss.  Even though he really
doesn't need the information in your correspondence, and you
don't expect him to answer you or take any action, you still want
him to know that you're doing your job, and how you're handling
this matter, and you want him to have the information available
IF he wants to see it.

You might be interested in
The network team has well established procedures to follow for creating new rules on the firewall. This includes having approval
jarptica [38.1K]

Answer:

hello your question has missing options below are the missing options

A. Monitor all traffic using the firewall rule until a manager car) approve it.

B. Immediately roll back the firewall rule until a manager can approve it

C. Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

D. Have the network team document the reason why the rule was implemented without prior manager approval.

answer : Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible. ( C )

Explanation:

A good step to have in the procedures of a situation like this is

Don't roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.

4 0
3 years ago
To remove unwanted parts from an image, select the image and then choose the<br> option
Volgvan

Answer:

You need to make use of the Brush tool for removing the unwanted part of an image.

Explanation:

Yes, it is the brush tool or the lasso tool that you can make use of. and you will find brush tools in all sorts of image processing software may it be the paint or Photoshop. It is common to both the raster-based and vector-based image processing software. And you can easily find it inside the tool section, and then make use of it to remove the unwanted parts from an image.

8 0
4 years ago
An AM index between 0 and 1 indicates what? a. the AM signal is very small and will not be detected by the receiver b. distortio
Leto [7]

Answer:

Option c.

Explanation:

AM refers to the amplitude modulation.

AM refers to the modulation of a wave used as a means of broadcasting an audio signal by combining it with a radio carrier wave and varying its amplitude

An increase in message amplitude, Am, results in a higher AM Index.

An AM index between 0 and 1 indicates the received modulated signal will have minimal distortion.

So, option c. is correct.

7 0
3 years ago
The AutoRecovery feature would be useful for which situations? Check all that apply.
Aliun [14]

Answer:

All of the above but I'm not 100% sure.

5 0
3 years ago
array Write a recursive function stringReverse that takes a string and a starting subscript as arguments, prints the string back
amm1812

user_in = str ( input ("Please enter a phrase: " ))

def reverse_str (string):

e = 0

for e in range (len (string)):

x = -1

print string[x]

x += (len (string))

8 0
3 years ago
Other questions:
  • A ____ attack is much more substantial than a DoS attack because of the use of multiple systems to simultaneously attack a singl
    13·1 answer
  • A web designer must effectively communicate when he/she designs a web page. If there is too much information to put onto one pag
    8·1 answer
  • Jennifer has written a business report. What should be her last step before she submits the story for publication?
    10·2 answers
  • Often used in connection with a business
    6·1 answer
  • Eugene wants to indent a paragraph, but the ruler is not present. Which tabs could Eugene use in order to accomplish his goal?
    6·2 answers
  • Explain how each of the five types of prewriting assist a writer in getting started. please make it short.
    15·1 answer
  • How do I make someone "Brainiest". <br> First person to reply will get "Brainiest"
    8·2 answers
  • After you have located a program name from the Start menu, in order to create a shortcut on the desktop.
    8·1 answer
  • "You have created a Word document named apple.docx using Microsoft Word. What type of a file is apple.docx ? Select all that app
    14·1 answer
  • Which term refers to the use of the internet at work for personal use?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!