1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
3 years ago
12

What are the three business writing formats

Computers and Technology
1 answer:
Tasya [4]3 years ago
8 0
They are Block, Modified Block, and Semi - Block Styles. Hope this Helps:)))
You might be interested in
What are two example of ways an electronic record may be distributed to others?
murzikaleks [220]
By email or publishing on the internet, I hope that helps!
4 0
3 years ago
There is only one way to change line spacing in Word.
kobusy [5.1K]
False Line spacing options

Single    This option accommodates the largest font in that line, plus a small amount of extra space. The amount of extra space varies depending on the font that is used.

1.5 lines    This option is one-and-one-half times that of single line spacing.

Double    This option is twice that of single line spacing.

At least    This option sets the minimum line spacing that is needed to fit the largest font or graphic on the line.

Exactly    This option sets fixed line spacing, expressed in points. For example, if the text is in a 10-point font, you can specify 12 points as the line spacing.

Multiple    This option sets line spacing that can be expressed in numbers greater than 1. For example, setting line spacing to 1.15 will increase the space by 15 percent, and setting line spacing to 3 increases the space by 300 percent (triple spacing).

hope this help
4 0
4 years ago
Why are large commercial companies interested in developing mobile apps for smartphones?
loris [4]
Because they can make a lot of money if they create a popular application.
7 0
3 years ago
A public key is part of what security measure?
lord [1]
A public key or the asymmetric key which is used for the authentication process. It consists of a pair of keys in which one key encrypts and the other decrypts. It come under Public Key Infrastructure (PKI) and is a part of INFORMATION SECURITY measures. PKI is the management solution for the keys.
6 0
3 years ago
Wat is a computer risk<br>​
klemol [59]

Answer:

Virus, cyber theft

Explanation:

A computer risk is something that can potentially harm your data on your computer or harm you through a computer by using theft tactics from real people to autonomous viruses making it to your computer and slowing your computer. With cybrrtheft thieves can get personal info through accounts to pictures and payment information.

4 0
3 years ago
Read 2 more answers
Other questions:
  • A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection w
    9·1 answer
  • Using the SUM function allows a series of numbers to be 1. Multiplied 2. Subtracted 3 Added 4. Divided
    11·1 answer
  • Lionel wants to find images of colonies of Emperor penguins to use for a school project. Which of the following phrases should h
    15·1 answer
  • What is the full form of IE? ​
    9·1 answer
  • Which bitwise operation has the same effect as multiplying a by 16?
    6·2 answers
  • 2) Show the decimal equivalent of each of the numbers if they are interpreted as (4 answers): 11001101 01101001 a. Unsigned bina
    15·2 answers
  • Give one example of where augmented reality is used​
    11·2 answers
  • Write a program that asks a user to enter a date in month day year format (for example 10 12 2016) and displays the day of the w
    5·1 answer
  • Dispositivo de computo
    5·1 answer
  • Match the term to the correct definition.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!