1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmasim [6.3K]
3 years ago
9

Why should you avoid the use of sarcasm cliches and idioms in busniess letters?

Computers and Technology
2 answers:
Oliga [24]3 years ago
3 0
You would not be taken as seriously as you should be by other businesses.
olga2289 [7]3 years ago
3 0

Because their use does not meet business English standards.  (apex 2018)

You might be interested in
What is a BUG in terms of computer programming?
diamong [38]

Answer:

C

Explanation:

4 0
3 years ago
We learned that an ideal multiple access protocol has FOUR desirable
Nataly [62]

Answer:

We learned that an ideal multiple access protocol has FOUR desirable

characteristics, describe them.

Explanation:

1.- Very experienced technology and easy to implement.

2.- Rigid resource management and unfit for variable traffic flows.

3.- Requires antenna duplexer for duplex transmission.

<u>Duplex</u> <em>is a term used in telecommunication to define a system that is capable of maintaining two-way communication, sending and receiving messages simultaneously. </em>

4.- Normally FDMA is combined with multiplexing FDD.

<u>FDMA</u> (acronym in English for Frequency Division Multiple Access) <em>is a multiplexing technique used in multiple communication protocols, both digital and analog, mainly radio frequency, and among them in mobile phones of GSM networks. </em>

<u>FDD</u> (Frequency Division Duplexing in English) <em>designates a duplex method in the environment of wireless telecommunications and over certain wired networks.</em>

4 0
4 years ago
How does an agile team obtain clarity on backing items that may be picked up in upcoming iterations? (1 correct answer)
Vinvika [58]

Answer:

The correct answer to the following question will be "Option 4".

Explanation:

Group seems to have a backlog optimization conversation with either the company owner after each iteration to obtain insight about the backlog things to have been collected in the future iterations or executions.

  • Without the need to get feedback on the backlog or pending things in preparation for potential implementations.
  • The next phase brings the dedicated backlog to completion. Iteration targets are calculated, based on dedicated research.
8 0
4 years ago
You are attempting to run a Nmap portscan on a web server. Which of the following commands would result in a scan of common port
Bess [88]

Answer:

Nmap CST CO CT0

Explanation:

Network map (Nmap) is a network scanning and host detection tool used in penetration testing to sorting out vulnerability in a network. Nmap APIs are used in packet sniffer tools as well to scan for available networks. There are different nmap command , but the command needed to scan a port with less noise to evade an IDS is the nmap's "Nmap CST CO CT0" command.

5 0
3 years ago
In Rizzati Corp, vice presidents in departments such as engineering, manufacturing, IT, and human resources report directly to t
Harrizon [31]

Answer: <em>Functional organizational structure.</em>

Explanation:

From the given case/scenario, we can state that Rizzati Corp has a functional organizational structure. Functional organizational structure is referred to as a structure which is used in order to organize employees. The employees are mostly grouped or organized based on their knowledge or specific skills. It tends to vertically structure each and every department or staff with specific roles from VP to sales and finance departments, to worker assigned to commodities or services.

7 0
3 years ago
Other questions:
  • Discuss how and why video game hardware affects game design and where you think the next generation of platforms will change tho
    9·1 answer
  • Find functions f1 and f2 such that both f1 and f2 are O(g(n)), but f1(n) is not O(f2)
    6·1 answer
  • Given a string, return a version without the first and last char, so "Hello" yields "ell". The string length will be at least 2.
    13·1 answer
  • PLEASE HELP ASAP!! WILL MARK BRAINLIEST!! 20 POINTS!!
    6·1 answer
  • Research different ways that 3D printing is used in society. Tell us about the items that are 3D printed.
    15·2 answers
  • The data manipulation language (DML) of SQL contains SELECT, INSERT, DELETE, and UPDATE statements, whereas the data definition
    12·1 answer
  • Both k-means and k-medoids algorithms can perform effective clustering. (a)Explain the strength and weakness of k-means in compa
    5·1 answer
  • Can someone help me?
    7·2 answers
  • what is required to successfully establish a connection between two routers using chap authentication?
    14·1 answer
  • When you are typing data that is in a series, such as days of the week or months of the year, you can use this tool to complete
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!