1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nitella [24]
4 years ago
15

Ann needs to share information about a new hiring policy. She needs to communicate this information to more than one hundred emp

loyees. Ann should _____.
write a research paper
send a business report
send a memo
create a newsletter
Computers and Technology
2 answers:
Vaselesa [24]4 years ago
7 0

Ann should send an inter-office memo via email

nata0808 [166]4 years ago
6 0

Answer: Send a memo

Explanation:

 Memo is stand for Memorandum and it is usually use for written some useful information for the business purpose.

 Memo is known for its high versatile communication and it is usually used for the business purpose.

The memo is written for informing the readers about some new information, policies and about prices change in the business organization. The memo is basically divided into the two main parts that are:

  • The top subject information about the message
  • The main content of the message    

Therefore, Ann should use a memo for informing about the hiring policies among more than hundred employees.

You might be interested in
Use the variables k and total to write a while loop that computes the sum of the squares of the first 50 counting numbers, and a
pshichka [43]
Int   k=0.total=0;
while(k++<50)
    total+=k*k;
    

5 0
4 years ago
________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
Fynjy0 [20]

Answer:

TLS

Explanation:

In the field of computer security, TLS refers to Transport Layer Security it is closely related to the Secure Sockets Layer (SSL) although TLS is more commonly used these days. They are both techniques in cryptography that provides for the safe transfer of information between two parties (servers, systems and user applications)

TLS particularly provides a balance between transmission speed and data security through the use of symetric and asymmetric cryptography and the encryption and decryption key is the session key at both ends (sender and reciever), as such TLS has found usage in most advanced data exchange systems like credit card processing and online banking.

8 0
4 years ago
The _____ is the area in Microsoft Excel where you can perform file commands such as Save, Open, and Print
Xelga [282]
I believe the answer is Backstage view
Back stage view gave you the complete command as options for users to manage our files and data in the office such as saving, print, inspecting meta data, etc. To access backstage view, you just need to click the file tab on left top corner.
5 0
3 years ago
Read 2 more answers
you have just finished developing a new application. before putting it on the website for users to download, you want to provide
Nostrana [21]

If you have just finished developing a new application, but before putting it on the website for users to download, you want to provide a checksum to verify that the object has not been modified, a process which you must implement is: C. Code signing.

<h3>What is SDLC?</h3>

SDLC is an abbreviation for software development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality software programs.

<h3>What is code signing?</h3>

In Computer technology, code signing can be defined as a process through which software developer and computer programmers digitally sign executable software codes and scripts in order to confirm the author of the software, as well as guaranteeing that the software code has not been altered (modified) or corrupted, especially through the use of a cryptographic hash so as to validate authenticity and integrity.

In this context, we can reasonably infer and logically deduce that it is important for software developer and computer programmers to implement code signing before making a software available for download on a website.

Read more on software development here: brainly.com/question/28262663

#SPJ1

Complete Question:

You have just finished developing a new application. Before putting it on the website for users to download, you want to provide a checksum to verify that the object has not been modified.

Which of the following would you implement?

answer choices

Normalization

Code obfuscation

Code signing

Memory management

3 0
1 year ago
This is a while loop question for Information technology.
aev [14]

Answer: use GitHub

Or stack overflow

Explanation:

6 0
3 years ago
Other questions:
  • Given two int variables, i and j, which have been declared and initialized, and two other int variables, itemp and jtemp, which
    14·1 answer
  • Neighbor discovery performs many of the functions that icmp router discovery and icmp ____ handled in ipv4.
    13·1 answer
  • Which network component allows computers to communicate on a network without being connected directly to each other?
    9·1 answer
  • 6. Write a program that can multiply an n x m matrix and m x n matrix together: The input specifications are these: Read n and m
    11·1 answer
  • What is the most common drive letter where window stores most data and programs. 1,a 2,b 3,c 4,e
    9·1 answer
  • What coding language should i begin with if i'm looking to get into AI ?
    11·1 answer
  • ​Microsoft claims that the microsoft project software can _____.
    11·1 answer
  • Pleaseeeee helppp
    5·1 answer
  • In your own words, describe invention.
    8·2 answers
  • What is a decryption key?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!