1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astraxan [27]
3 years ago
12

What should be included in the closing portion of your letter or e-mail?

Computers and Technology
2 answers:
andrey2020 [161]3 years ago
5 0

Answer

Your contact information

Explanation

A letter is one person's written message to another pertaining to some matter of common concern while an emails are messages distributed by electronic means from one computer user to one or more recipients via a network. Letters and mails should contain your contact information.

Contact information is an individual's private or personal information by which another person, can use to reach the other individual person.

eduard3 years ago
5 0
The thing that should be included in the closing portion of your letter or email is your contact information. You need to let the person you are talking to know how to contact you if they need to.
You might be interested in
If classes C1 and C2 both implement an interface Cint, which has a method whichIsIt, and if C1 c = new C1( ); is performed at on
Assoli18 [71]

Answer:

FALSE

Explanation:

Because C1 and C2 implement the same interface, they both implement whichIsIt. The variable c is known as a polymorphic variable, meaning that it can change from being an C1 to a C2. So, the message c.whichIsIt( ); may invoke C1's whichIsIt or C2's whichIsIt. This can only be known at runtime.

5 0
3 years ago
the actual use and implementation of computer started after third generation justify this statement in your own words.​
cestrela7 [59]

Answer:

BLACK LIVES DONT MATTER

Explanation:

6 0
2 years ago
Interactive sites were usually is right about important topics and comments to a threaded discussion are called
iren2701 [21]
The answer to this question is:

Interactive sites were usually is right about important topics and comments to a threaded discussion are called"Blogs"

Hoped This Helped, Euniceortiz13
Your Welcome :)
8 0
3 years ago
Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
il63 [147K]

Answer: An example of such a scenario would be when the user name and password meant to allow access to a customers bank account statement is cracked by unauthorized people this causing alteration (in the form of data diddling attacks) in the data contained in the statement. This is a compromise in integrity.

Explanation:

Confidentiality entails securing things people want to remain secret. An account statement of a bank customer is a confidential document which is to be kept secret. A password allows access to it.

Integrity implies receiving a sent data/information as accurately as it came from a sender. A data diddling attack alter integrity because the original information is altered by an unauthorized person.

7 0
3 years ago
Given a list of twenty number count the numbers among the list
Finger [1]

Answer:

Thank you for the points<33

7 0
2 years ago
Other questions:
  • What commands will reset a network interface in Linux?
    13·1 answer
  • Analog false color in computer graphics
    6·1 answer
  • How is the EF​ computed? A. ES​ + Activity time B. LF minusActivity time C. ​Min{LS of all immediate following​ activities} D. ​
    11·1 answer
  • To add another worksheet to an Excel file, click on the _____
    15·1 answer
  • You cannot legally install macOS on a PC that originally came with Windows<br> True or false
    13·2 answers
  • Summarize the four critical issues for cyber warfare.
    6·1 answer
  • Based on the information in the table, which of the following tasks is likely to take the longest amount of time when scaled up
    14·1 answer
  • 21. If you want to improve the performance of your PC, you need to upgrade the
    7·1 answer
  • 6.1.5: Function definition: Volume of a pyramid.
    8·1 answer
  • While working on a Windows workstation, you've enabled Remote Desktop.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!