1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
3 years ago
10

Traditional methods of business communication tend to mean paper-based messages such as formal letters, brochures, reports, prop

osals, and notes. Based on the advantages of using digital communication discussed above, why would we wish to continue to use traditional means?
Computers and Technology
1 answer:
Mila [183]3 years ago
5 0

Traditional methods of business communication tend to mean paper-based messages such as formal letters, brochures, reports, proposals, and notes.

There is no denying the fact that digital communication has a lot more advantages as compared to the traditional methods of business communication, but there are certain cases and situations where traditional methods and preferred over digital communication.

Paper-based messages provide objective evidence that a formal undertaking has been issued. The advantage of paper-based messages is that they can't be tampered with and not reproduced. They represent the signature of the concerned authority and are always treated above the digital signatures.

You might be interested in
The software used to help run the computer hardware is the _____.
TiliK225 [7]
C. system software
if it means drivers and so on
6 0
3 years ago
Read 2 more answers
Most of the Desktop games contain a backdoor used to test and update the game.
sveta [45]

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer" —a tiny computer-within-a-computer such as that found in Intel's AMT technology).Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems. From there it may be used to gain access to privileged information like passwords, corrupt or delete data on hard drives, or transfer information within autoschediastic networks.

the answer is True

i hope it will help you

8 0
3 years ago
Anchor hyperlink to position the cursor to the section called sisters? i need a code pls
enot [183]

use an anchor tag(<a>This is an anchor tag</a>) and use the href attribute and set it's destination to the section element who's id or class is "sisters".



Example:

<a href="#Sisters">Click Here!</a>

then you can add this somewhere on the document.

<section id="Sisters">Hello World!</section>

7 0
3 years ago
What is the advantage of using CSS?
zhannawk [14.2K]
Your answer would be B.) "It streamlines the HTML document."
8 0
3 years ago
Read 2 more answers
What would be the code of this in HTML ??
Alla [95]

Answer:r tHE RED LINE

Explanation:

Its not supost to be there

8 0
3 years ago
Other questions:
  • When you tell a computer what to do, you are providing input?
    11·1 answer
  • Retrieve the names of employees who work on exactly one project that is controlled by their department. (It does not matter how
    7·1 answer
  • Alex’s family members live in different parts of the world. They would like to discuss the wedding plans of one of their distant
    7·2 answers
  • Write out a shorthand version of the border property which will apply border that is 5 px wide, colored in lightgreen, and solid
    9·1 answer
  • Why was the pilgrim's first corn crop such as successful one??
    7·1 answer
  • me pueden ayudar con mi trabajo sii porfss si me dan la respuesta correcta y les doy la mejor coronita si​
    12·1 answer
  • Rewritable (write, erase, write again) is known as _______.
    7·1 answer
  • ...............is a personal computer that fits on desk.​
    5·2 answers
  • Most case fans have standard _______________ connectors that are easy to plug in but can be forced to be connected the wrong way
    14·1 answer
  • What is the difference between referential and entity integrity
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!