1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rasek [7]
3 years ago
6

When following proper netiquetter rules you should follow all of the following rules except _____. Question 11 options: Don't us

e acronyms such as LOL and TTYL unless you are sure the reader will understand them Never write your e-mails in ALL CAPS unless you are intending to shout at the reader Use sarcasm and jokes in your e-mails to make the reader laugh When sending group e-mails, respect people's privacy by typing the e-mail addresses in the BCC field
Computers and Technology
2 answers:
vfiekz [6]3 years ago
6 0

The answer is C. Use sarcasm and jokes in your e-mails to make the reader laugh


Sarcasm and jokes can be difficult to understand through text-based communication like e-mails, so it is best to avoid them altogether, especially in formal settings.

Naily [24]3 years ago
5 0

Answer:

the answer is C: Proper

i just took the test

Explanation:

You might be interested in
During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those por
Setler [38]

Answer:

Following are the solution to the given question:

Explanation:

It sends commands to its Nmap executable platForm, which is used to specified and retrieves the production. The  ZenMap utilizes templates, which are primarily Nmap.

The parameter templates to decide how scans become formed Several ports, like ports, are available: 11, 21, 22, 25, 53, 445, and 3306, all of which run TCP: Linux services, SMTP Postfix, Apache Tomcat/Coyote JSP.

5 0
3 years ago
Describe the importance of prioritizing your focus when designing for multiple purpose
sp2606 [1]
<span>While Designing for Multiple purpose the prioritizing our focus is an essential part, when missed can lead to vague information and may spoil the sole purpose of the product that was meant to be designed. Our focus should always point to the MVP or Minimum Viable Product that needs to be delivered and on top what type of aspects we bring in to serve the multiple purpose need. The focus on order of prioritization should never be compromised unless there is something very essential that was left without incorporating at the designing stage.</span>
3 0
3 years ago
Which benefit does the cloud provide to star-up companies without access to large funding?
Nostrana [21]

Explanation:

Start-up companies can store, manage, process data and use programs through a web-based interface – something that greatly reduces costs. Data stored in the cloud can be accessed from anywhere through various devices with web connectivity, which is an advantage for small companies that don't have a huge IT budget.

4 0
3 years ago
Peyton is having trouble searching for information on butter lettuce. Every time he searches for it, he gets some results for bu
Svetllana [295]

Explanation:

don't search butter lettuce it's a veggie so you say butter lettuce vegetable

7 0
3 years ago
Read 2 more answers
What helps in determining the reliability of a person to repay debt?
faust18 [17]

C. The amount of credit score

3 0
3 years ago
Read 2 more answers
Other questions:
  • Exchanging which type of data uses the least bandwidth?
    14·1 answer
  • Brent is using customer reviews from a reputable online store to help him determine whether or not he should buy a particular la
    10·1 answer
  • Xbrl taxonomy: is the document format used to produce web pages. is the final product (report. is a classification scheme. is a
    12·1 answer
  • List the seven basic internal components found in a computer tower
    6·2 answers
  • To use the AutoCalculate area, select the range of cells containing the numbers for a calculation you want to verify and then pr
    6·1 answer
  • Anna wants to keep information secure from offenders. Which software should she install on her computer to ensure Internet safet
    13·1 answer
  • While reviewing system logs, a security analyst notices that a large number of end users are changing their passwords four times
    13·1 answer
  • What is the location in the base interface of the link to
    7·1 answer
  • What does this mean startUp()
    13·1 answer
  • A department store maintains data on customers, products, and purchase records in three tables: customer, product, and purchase.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!