1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Taya2010 [7]
3 years ago
15

These are the two main factors that determine what type you should use in your business communications. Type isn't important if

your message is well-written. Your intended audience influences type selection. There are good types and bad types. The type you use should be easy to read.
Computers and Technology
1 answer:
alina1380 [7]3 years ago
5 0

PLS DO NOT COPY MY ANSWER

TY

Type isn't important if your message is well-written. Your intended audience influences type selection. There are good types and bad types. The type you use should be easy to read

If something is spelled wrong or the information is incorrect I am so sorry!

Brainliest?

You might be interested in
The Dark Web is _____. Select 2 options.
fiasKO [112]

Answer:

a. an international marketplace where criminals buy and sell products.

c. a capitalistic marketplace for criminals and non-criminals.

Explanation:

In computing, WWW simply means World Wide Web. The world wide web was invented by Sir Tim Berners-Lee in 1990 while working with the European Council for Nuclear Research (CERN); Web 2.0 evolved in 1999. Basically, WWW refers to a collection of web pages that are located on a huge network of interconnected computers (the Internet). Also, users from all over the world can access the world wide web by using an internet connection and a web browser such as Chrome, Firefox, Safari, Opera, etc.

In a nutshell, the world wide web (www) is an information system that is generally made up of users and resources (documents) that are connected via hypertext links.

The dark web also referred to as darknet, can be defined as a subset of the world wide web that is intentionally encrypted from conventional web browser and search engines. Thus, it is a peer-to-peer network that requires the use of specialized configuration and web browser such as "Tor browser" in order to access its contents.

Generally, all the internet activities carried out on the dark web are anonymous and private, thereby making it suitable for either legal or illegal operations. Also, it's devoid of government influence or control and as such it's typically a capitalistic marketplace, where goods and services are privately owned and controlled by the people.

Hence, we can deduce that the dark web is simply;

I. An international marketplace where criminals buy and sell their products.

II. A capitalistic marketplace for criminals and non-criminals.

4 0
3 years ago
from january 2005 through july 2015, approximately how many electronic data records in the United States were breached, exposing
Brums [2.3K]
From January 2005 through July 2017, approximately 853 million electronic data records in the US were breached.
This allowed the attackers to take control over people's personal data, such as their various credit card numbers, and other important data, as well as their addresses, etc. The cyber police, as well as the regular police have been working hard to stop this from happening, but the hackers are very strong and smart.
4 0
3 years ago
What kind of website uses keywords to locate content?
docker41 [41]

search engines such as google, bing, yahoo and internet explorer

4 0
3 years ago
Can you copy rows from excel and paste them into a word document on a mac?
zvonat [6]
I believe so but correct me if I'm wrong.
3 0
4 years ago
Which button in the Sort & Filter gallery of the Data tab would alphabetize from A to Z quickly?
LenaWriter [7]

Answer:

the answer is B (AZ down arrow)

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Define scanning and why it’s considered one of the most important phases of intelligence gathering for an attacker. Also discuss
    10·1 answer
  • Is this statement true or false?
    13·1 answer
  • Is an important and necessary step that precedes object-oriented programming?
    6·1 answer
  • Is a house phone a computer?<br> And why??
    14·2 answers
  • Write a method called makeStars. The method receives an int parameter that is guaranteed not to be negative. The method returns
    14·1 answer
  • Write a program that asks for the names of three runners and the time, in minutes (no seconds, etc.), it took each of them to fi
    7·1 answer
  • 2. Voltage is:
    13·1 answer
  • Given three floating-point numbers x, y, and z, output x to the power of z, x to the power of (y to the power of z), the absolut
    12·1 answer
  • True or False? Voice recognition is the process of determining the meaning of the words spoken by a human.
    7·1 answer
  • 18. which of these components is responsible for providing instructions and processing for a computer? a. cpu b. ssd c. ram d. r
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!