1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sasho [114]
4 years ago
5

Which email writing etiquette should Ariel follow to let people know that she received their message?

Computers and Technology
1 answer:
gtnhenbr [62]4 years ago
6 0

I'm pretty sure its either A or D

You might be interested in
_______is a term which describes how the operating system will interrupt the execution of an application when an application of
a_sh-v [17]

Answer:

scheduling

Explanation:

Scheduling- it is referred to as assigning a task to complete the goal or work on time. he works can include data flow, processing of data, etc.

There are two main types of scheduling

1) Preemptive process

2) Non- preemptive process

Preemptive process -  in this process, priority is given to important tasks rather than less important tasks. the current task can be held for an important task

Non-preemptive process -  It is referred to that process when the predefined schedule follows. In this  process, next task executed only when current task finish

6 0
3 years ago
When entering a function or formula in a cell, which of the first character you must type?
lions [1.4K]
When entering a function or formula in a cell, which of the first character you must type =
3 0
3 years ago
Read 2 more answers
A network engineer executes the following command sequence (-i specifies the TTL of the ICMP packet sent):
harkovskaia [24]

The correct option is D. tracert; This sequence emulates is utilities for the command sequence.

<h3>Explain the term command sequence?</h3>

We can complete operations that need numerous phases thanks to sequence, which refers to the order in which commands are processed by a computer.

  • Sequence is indeed a basic algorithm in programming: a series of sequentially carried out logical steps.
  • Network engineers create and implement network setups, address performance issues, monitor networks, and set up firewalls and other security measures.
  • By delivering Internet Control Message Protocol (ICMP) is  echo packet to a target, the TRACERT diagnostic tool ascertains the path to the location.

Thus,  utilities is emulated by this sequence is TRACERT .

To know more about the command sequence, here

brainly.com/question/27703743

#SPJ4

3 0
1 year ago
Hey i need some help with code.org practice. I was doing a code for finding the mean median and range. the code is supposed to b
geniusboy [140]

Answer:

https://studio.code.org/projects/applab/YGZyNfVPTnCullQsVfijy6blqJPMBOgh5tQ5osNhq5c

Explanation:

7 0
3 years ago
What is the purpose of using SmartArt Graphics and what is one way you can use SmartArt Graphics in your presentation(s)?
Sladkaya [172]
The purpose of smart art graphic is to show is basically for show for people to see and it helps your presentation by giving it a pop to it
7 0
3 years ago
Other questions:
  • A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
    11·1 answer
  • What is used in computers to communicate with wireless keyboards, mice, and printers?
    8·1 answer
  • Which course must first-time drivers in Florida take to be eligible for their Learner License?
    11·1 answer
  • If you want to open the Navigation pane to do a Find, what should you first click on the Home tab? Paragraph, Editing, Styles, o
    15·1 answer
  • Write a program that assigns values to
    15·1 answer
  • If you enter the search "genetically modified foods" in a database, the double quotes around the three words will:
    11·1 answer
  • The most important preinstalled software is the ______ software that allows you to use the computer the first time you turn it o
    7·1 answer
  • 4. is the disappearance of the individual a bad thing?
    8·1 answer
  • Is each of the following method identifiers (a) legal and conventional, (b) legal but unconventional, or (C) illegal?
    5·1 answer
  • What is one difference between a web page and a web application?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!