1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ryzh [129]
3 years ago
11

What should you do prior to writing your business document?

Computers and Technology
1 answer:
mart [117]3 years ago
5 0

You should

1.Identify Your Audience

2.Identify the Document's Purpose and Keep it Focuse

3.Organize Your Writing

4.Re-Read Your Business Document Before Sending

5.Make Sure Your Business Document Appears Professional

You might be interested in
Create a function named CountVowels() that takes one parameter name epsilon
LenaWriter [7]

def CountVowels(epsilon):

   countNum = 0

   for x in range(len(epsilon)):

       letter = epsilon[x]

       if letter.lower() in "aeiou":

           countNum += 1

   return countNum

def ExtractOdds(zeta):

   result = ""

   for x in range(len(zeta)):

       if x % 2 == 1:

           result += zeta[x]

   return result

sentence_A = input("Enter a sentence: ")

sentence_B = input("Enter a sentence: ")

print(CountVowels(sentence_A))

print(ExtractOdds(sentence_B))

I hope this helps!

5 0
3 years ago
What is the difference in adware and spyware
Katarina [22]

Generally speaking, adware is a program that installs an additional component that feeds advertising to your computer, often by delivering pop-up ads or by installing a toolbar in your browser.

Some adware may hijack your browser start or search pages, redirecting you to sites other than intended. Unless you're a fan of guerrilla marketing, such tactics can be annoying. Worse, the mechanism that feeds the advertising can introduce system anomalies or incompatibilities that cause problems with other programs and can even disrupt the functioning of the operating system.

Spyware surreptitiously monitors your computer and internet use. Some of the worst examples of spyware include keyloggers who record keystrokes or screenshots, sending them to remote attackers who hope to glean user IDs, passwords, credit card numbers, and other sensitive information.

Most often, though, spyware takes a more benign but still quite offensive form. The information gathered, often referred to as "traffic data," can consist of monitoring the websites visited, ads clicked, and time spent on certain sites. But even in its more benign form, the collected data can morph into something far more insidious.

Hope this helped.. ;D

3 0
3 years ago
Read 2 more answers
When configuring a vpn server to automatically assign ​ip addresses to remote clients, how many ip addresses are in a single poo
xz_007 [3.2K]
<span>When configuring a vpn server to automatically assign ip addresses to remote clients, how many ip addresses are in a single pool allocated by the vpn server?
Answer: 10</span>
5 0
4 years ago
​When converting plain text to hexadecimal for use with ProDiscover, you need to place ____________ between each character's hex
mina [271]

Answer:

Null(00) is the correct answer to the following blank.

Explanation:

Because when we changing the plain text into the hexadecimal then, we have to place null(00) to use with pro-discover in the middle of each and every hexadecimal value. We use null(00) because the null value contains 0(zero) or having no value.

So, that's why the following answer i.e., null(00) is true.

3 0
4 years ago
What is the function of ctrl+Q​
vlabodo [156]

Answer:

Ctrl+Q is used to remove a paragraph's formatting

Explanation:

Hope that's the answer you're looking for!

5 0
3 years ago
Other questions:
  • What are the names of each devices pleaseee​
    13·2 answers
  • Assuming that data mining approaches are to be used in the following cases, identify whether the task required is supervised or
    12·1 answer
  • Every employee of your company has a Google account. Your operational team needs to manage a large number of instances on Comput
    10·1 answer
  • LILLE VIC LUNCUL ANCI.
    5·1 answer
  • In what software development model does activity progress in a lock-step sequential process where no phase begins until the prev
    7·1 answer
  • You need to synchronize your mobile device data with your desktop computer. for security reasons, your organization prohibits sy
    5·1 answer
  • Does anyone know how to connect a nintendo switch to a laptop?
    10·2 answers
  • What is kerning in Adobe Indesign
    7·1 answer
  • How do you convert hexadecimal to denary
    13·1 answer
  • What are the 3 attributes of information?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!