1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Komok [63]
3 years ago
7

Josh wants to convey his best wishes to johnathin for a meeting schedualed later diring the day. Which business documented would

be most approperiate in his senario
Computers and Technology
1 answer:
Sedbober [7]3 years ago
4 0

Answer:

C.  email

Explanation:

The Email should be termed as electronic mail which is to be used to convey a message in an instant seconds

It is to be expressed in a formal way of communicating any message, notice, The important thing, etc

It is a quick, easy to use and most convenient way to send a message

Here in the given situation, since John wants to convey the best wishes for a meeting that scheduled later so here the email is the best and appropriate way to communicated as it is business documented also

You might be interested in
Not a subject question but please help
Doss [256]

Answer:

You go to account settings, edit your profile and click preferences and then go to choose level and put which grade u are in the options r middle school, high school, and college

Explanation:

8 0
3 years ago
Read 2 more answers
Which two settings must you configure when fortigate is being deployed as a root fortigate in a security fabric topology?
Goryan [66]

The two settings that one must configure when fortigate is being deployed as a root fortigate in a security fabric topology are:

  • Option A. Enables you to view the logical and physical topology of Security Fabric devices.
  • Option  C. Enables you to view the security ratings of FortiGate Security Fabric groups.

<h3>What is security fabric settings?</h3>

The term Security Fabric is known to be a tool that aids one or allows one's network to be able to automatically see and also dynamically isolate any kinds of affected devices.

Note that is one that can also partition network segments, update rules, and they can bring out new policies, and delete malware.

Hence, The two settings that one must configure when fortigate is being deployed as a root fortigate in a security fabric topology are:

  • Option A. Enables you to view the logical and physical topology of Security Fabric devices
  • Option  C. Enables you to view the security ratings of FortiGate Security Fabric groups.

See full question below

Which two Security Fabric features are on FortiManager? (Choose two.)

Select one or more:

A. Enables you to view the logical and physical topology of Security Fabric devices

B. Enables you to run security rating on FortiGate devices

C. Enables you to view the security ratings of FortiGate Security Fabric groups

D. Enables you to view and renew Security Fabric licenses for FortiGate devices

Learn more about security from

brainly.com/question/25720881

#SPJ1

8 0
2 years ago
Mika forgot to put in the function name in his function header for the code below. What would be the best function
kondaur [170]

Answer:

I think it's A, def drawDiamond():

Explanation:

5 0
3 years ago
tion. 6. A step occasionally required to repair damaged relationships is O A. looking at the problem from the other person's poi
Marta_Voda [28]
The answer to this question is b that's the answer
5 0
3 years ago
Susan is a network administrator and is setting up her company's network. In the process to determine an open port on a firewall
Dovator [93]

Answer:

poop head is big butt

Explanation:

soorru

4 0
2 years ago
Other questions:
  • To execute a prepared SQL statement, you can use the _______ and execute methods of the PDOStatement object to set parameter val
    9·1 answer
  • All of the following are the four more widely social media networks discussed in the text EXCEPT:
    11·2 answers
  • Assume that name and age have been declared suitably for storing names (like "Abdullah", "Alexandra" and "Zoe") and ages respect
    8·1 answer
  • Write a method drivingCost() with input parameters drivenMiles, milesPerGallon, and dollarsPerGallon, that returns the dollar co
    10·1 answer
  • Managers looking for advice on properly dealing with obsolete technology hardware can: a) consult the e-Stewards program b) seek
    9·1 answer
  • Random number between 0 and 5 (inclusive)
    10·2 answers
  • If your pulse is higher than your Target Heart Rate during exercise, what should you do?
    5·2 answers
  • What kind of block do you need to check whether a sprite is touching another sprite?
    10·1 answer
  • What type of task can be defined to allow you fine-grained control over the management tasks a user can perform in an OU
    14·1 answer
  • Write a recursive, string-valued method, reverse, that accepts a string and returns a new string consisting of the original stri
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!