1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
const2013 [10]
3 years ago
9

Where in an email would u find information about the action requirements​

Computers and Technology
1 answer:
Assoli18 [71]3 years ago
3 0

Answer:When trying to find the action that you need to do in an e-mail, it is best to consult the body of the email, also known as (B) in the message.. The message would detail the tasks that you need to tackle, which are generally not detailed in the subject line, greeting, and you will most definitely not find in the to field.

Explanation:

You might be interested in
Congress are smart becuase.....
spin [16.1K]

Answer:

If we are talking about government then they are smart bc of there two house policies, both are equal yet super unique. They make sure each state has an equal voice in the senate.

5 0
3 years ago
here is an email written by Michelle to Pattie what is the main netiquette violation in sentence b ?​
Artyom0805 [142]

Answer:

Using unfamiliar abbreviations and acronyms

Explanation:

because he using RHFD and LTRE

4 0
3 years ago
Given the multiplication 65535 x 32768, will the result cause overflow on a 32-bit system? Will the result need more than 32 bit
Alex

Answer:

65535 x 32768 =214 7450880

which is in the range of 32 bit unsigned integers, so there will be no overflow and we wont be in a need of more bits than 32 bit.

Explanation:

An overflow error indicates that software attempted to write down data beyond the bounds of memory.

Each program features a section of memory allocated for a stack. The stack is employed to store internal data for the program and is extremely fast and keep track of return addressing. A program may jump to a neighborhood that reads some data from the disk drive, then it returns from that routine to continue processing the info. The stack keeps track of the originating address, and therefore the program uses that for the return. Kind of like leaving breadcrumbs to seek out your way back. The stack features a limited amount of space for storing. If software attempts to access a neighborhood of the stack beyond its limits, an overflow error occurs.

• signed 32-bit integers support the range [-2147483648,2147483647]

• unsigned 32-bit integers support the range [0,4294967295]

And if you go outside this range, even temporarily, you would like to be very careful. Most cases handle the overflow technically and provide you "wraparound" or "modulo" behavior where carry bits outside the range just disappear and you're left with the low-order bits like the precise result.

In computer architecture of 32 bit, memory addresses, or other data units are those who are 32 bits (4 octets) wide. Also, 32-bit CPU and ALU architectures are those who have supported registers, address buses, or data buses of that size. 32-bit microcomputers are computers during which 32-bit microprocessors are the norm.

6 0
3 years ago
What is the term given to the controls that let you interact with an operating system?
Sophie [7]
Inputs are the contols that let you interact with an operating system.
4 0
3 years ago
The difference between the Basic Image Editing Software and Advance Image Editing Software.
Bogdan [553]

Answer:

Advance photo editing also involves correcting the colors of the image. It can be done by adjusting the color temperature. There is color tone which can be used to get bluish tint or the warm tone. Using the tint slider for shifting the magenta and green colors in scenic photographs.

6 0
3 years ago
Other questions:
  • What is a way to minimize technical problems with computer
    13·1 answer
  • Describe the effect of a pull up resistor
    7·1 answer
  • If you decide to get married, a trade-off would be that you have to give up being single.
    12·2 answers
  • Write a program to generate personalized junk mail. The program takes input both from an input file and from the keyboard.The in
    14·1 answer
  • Write java code that displays all the objects in a stack in the order in which they were pushed onto it. after all the objects a
    5·1 answer
  • Which one of these tasks is part of the pre-production phase of game development?
    5·2 answers
  • Explain the saying "Dress for the position you want, not the position you have."
    6·2 answers
  • What is it called when two different files generate the same hashing result?
    15·1 answer
  • When designing your navigation, your primary objective should be to include keywords for search engines.
    6·1 answer
  • How to share excel file for multiple users office 365?.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!