1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ladessa [460]
3 years ago
9

When is it most appropriate to quote from an e-mail message in a response?

Computers and Technology
2 answers:
allochka39001 [22]3 years ago
4 0
I would say *d. when the quote is a part of a series of e-mails written by more than one person.*

eskettit hope this helped.
Pie3 years ago
4 0

Answer:

When the quote is part of a series of e-mails written by more than one person.

Explanation:

This is one occassion in which it would be appropriate to quote from an e-mail message in a response. In this example, several e-mails are being exchanged. Because of this, it would be easy for someone to get confused as to the order or the origin of certain pieces of information. This would be especially true if the emails are written by more than one person. By quoting from the e-mail, the sender ensures that tracking information within these emails becomes easier.

You might be interested in
What is the name given to a collection of related fields such as ID number,name and address?
Hoochie [10]

Answer:

Record

Explanation:

The collection of related fields such as name, id and address of person is called record.

For example

A company collect the same information from all employs such as name, contact and address of all employ. this collection of data is called record.

3 0
4 years ago
In a bubble sort, you use a(n) ____ loop to make pair comparisons.
GarryVolchara [31]
In a bubble sort, you use an inner loop to make pair comparisons.
5 0
3 years ago
Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?
STatiana [176]
That would be what is known as Spyware, a common form of this is known as a "Trojan Horse". This type of malware is typically latched on and hidden within files, such as when downloading a pirated version of a song, game, art-work, etc...
3 0
3 years ago
Read 2 more answers
g The reciprocal Fibonacci constant ψ is defined by the infinite sum: ψ=∑n=1 [infinity] 1 Fn Where Fn are the Fibonacci numbers
timama [110]

Answer:

see explaination

Explanation:

MATLAB script:

% MATLAB script that calculates reciprocal Fibonacci constant Ψ

% Initial Values

a0 = 1;

a1 = 1;

% Looping variable

i = 2;

% Reading n value from user

n = input(' Enter n value: ');

% Initializing sum

sum = (1/a0) + (1/a1);

% Loop till i reaches n value

while i <= n

% Finding term in Fibnocii series

a2 = a0 + a1;

% Accumulating Sum

sum = sum + (1/a2);

% Updating previous terms

a0 = a1;

a1 = a2;

% Incrementing loop variable

i = i + 1;

endwhile

% Printing result

printf("\n Reciprocol Fibnocii Constant: %f \n", sum);

See attachment for sample output

5 0
3 years ago
Qbasic program to accept 10 numbers and to find their sum. <br>​
sesenic [268]

Answer:

the answer is 5

Explanation:

6 0
3 years ago
Other questions:
  • Describe mobile computing
    7·1 answer
  • What are the commands used in windows 2012 to mount the nfs share on the linux server?
    8·1 answer
  • How do I attach a file on the computer?
    13·1 answer
  • In general, font size for software-generated presentation slides should be no smaller than __________ points.
    8·1 answer
  • Give sally sue specific suggestions on how she can improve her powerpoint skills.
    6·1 answer
  • Which following is one of the basic characters of object-oriented systems : Select one: a. process b. data c. module d. inherita
    6·1 answer
  • Explain in three to four sentences what happens to data packets once they leave a node.
    11·2 answers
  • Name any two procedure oriented programming language​
    15·1 answer
  • The process of sending a result back to another part of the program is
    14·1 answer
  • 1. A _______ causes the computer program to behave in an incorrect or unexpected way.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!