1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulsSmile [24]
3 years ago
12

Alice is working on a web page to attract the maximum number of people to join her cause. She wants to inform people about the b

enefits of adopting eco-friendly methods of living. Which writing style should she use to get visitors to join her cause?
A. formal writing style

B. informal writing style

C. standard writing style

D. persuasive writing style

#.
Computers and Technology
1 answer:
Deffense [45]3 years ago
7 0

Answer:

Option D.    Persuasive writing style

is correct answer.

Explanation:

  • Alice should adopt the persuasive writing style as she wants to convince the people to adopt eco-friendly methods of living.
  • When a person write persuasively, this means he/she will present justifications and reasons for that specific opinion he/she is trying to convince the audience.
  • For the correctness of their opinion, different kinds of evidences are prepared so that the fact persuade the reader.
  • Persuasive writing is used widely while writing academic papers, advertisements  and argumentative essays as well.
<h2></h2><h2>i hope it will help you!</h2>

You might be interested in
The nl2br() function can be used to convert new line entries in a text area into html ________________ tags.
SSSSS [86.1K]
<span>The nl2br() function can be used to convert new line entries in a text area into html br tags.</span>
8 0
3 years ago
​printers, monitors,​ tablets, cpus, and laptops are examples of​ ____________.
AlladinOne [14]
​printers, monitors,​ tablets, cpus, and laptops are examples of​ ____________.

c. hardware
5 0
3 years ago
To calculate the chapter from which you must solve the programming exercise, divide the integer number representing your student
Mashutka [201]

Answer:

<em>import java.util.Scanner;</em>

<em>public class ANot {</em>

<em>    public static void main(String[] args) {</em>

<em>        System.out.println("Please Enter Your Student ID");</em>

<em>        Scanner in = new Scanner(System.in);</em>

<em>        int yourId = in.nextInt();</em>

<em>       int chapterToRead = (yourId%3)+3;</em>

<em>        System.out.println("You are to read chapter: "+chapterToRead);</em>

<em>    }</em>

<em>}</em>

Explanation:

This solution is implemented in Java programming language. The scanner class is used to receive user input which is saved in an int variable yourId. In order to obtain the remainder when the students' ID is divided by 3, we use the modulo (%) operator which returns the remainder

7 0
3 years ago
question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
erma4kov [3.2K]

The correct answer is MAC (Media Access Control).

<h3>What is MAC?</h3>

The Media Access Control (MAC) protocol is a data link layer protocol that defines the process by which local area network (LAN) devices interface with upper network layer protocols, such as the Internet Protocol (IP).

The MAC protocol is responsible for controlling access to the shared communication medium of the LAN and for providing a reliable link between devices on the LAN. It does this by defining a set of rules and procedures for how devices on the LAN can detect and avoid collisions when transmitting data, as well as for how they can recover from errors that may occur during transmission.

The MAC protocol is typically implemented in hardware, such as in the network interface controller (NIC) of a computer, and is an essential part of the LAN communication process.

To Know More About MAC, Check Out

brainly.com/question/29388563

#SPJ1

6 0
1 year ago
HELPPPPP 20 POINTS CORRECT ANSWER GETS BRAINLIEST<br>sorry wrong amount of points ;-;
Vinvika [58]

Answer:

C

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Frank is a writer. He needs to work for long hours and type for long periods on the computer. What injury can Frank develop?
    15·2 answers
  • Malware that corrupts the target operating system in such a manner that a network defender can no longer trust the native OS is
    15·1 answer
  • Why might your digital footprint be important when you are applying for collage
    13·1 answer
  • What term best describes the way the dns name space is organized?
    9·1 answer
  • How do you activate the Formula AutoComplete function of Excel 2016?
    15·2 answers
  • Write a function ngrams(n, tokens) that produces a list of all n-grams of the specified size from the input token list. Each n-g
    6·1 answer
  • A byte contains how many bits? Question 3 options:
    13·2 answers
  • Write a program that accepts the lengths of three sides of a triangle as an input from the user: A, B, C
    13·1 answer
  • Can you please help me
    9·1 answer
  • Hardware is found outside the system unit.​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!