1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erik [133]
3 years ago
7

In the textbox below, write an email that you, as an administrative assistant at Techno Inc., would write to request information

about office supplies at the request of your boss and that fulfills the requirements of the scenario. Your email should include a subject line and should be between 200-300 words in length.
Computers and Technology
1 answer:
zhuklara [117]3 years ago
8 0

Answer:

Please see below

Explanation:

From: Administrative Assistant

To: Vendor

Subject: INFORMATION ON SUPPLIES

In line with our departmental monthly review process to always ensure that our office supplies are always available, within the cost and quality expectations of the department, we would be requesting that you provide us with some information that would assist in the department implementation strategy on our office supplies.

The reports should not be limited to the unit cost per item, percentage discount per bulk item ordered, current stock level of the different items that falls under the office supplies, the suppliers, the turnaround time it would take to receive order, and any other information that you feel would drive our focus.

I appreciate your understanding and look forward to hearing from you so that we can better plan for the coming months.

Thank you

You might be interested in
1.What is a keyboard layout.
irina [24]

Answer:A keyboard layout is any specific physical, visual or functional arrangement of the keys, legends, or key-meaning associations  of a computer keyboard, mobile phone, or other computer-controlled typographic keyboard.

An output device is any peripheral that receives data from a computer, usually for display, projection

A printer is an output device that prints paper documents. This includes text documents, images, or a combination of both

Laser Printers and LED printers

Explanation:

8 0
3 years ago
Which of the following best describes a hotspot as
Ierofanga [76]

A statement which best describes a hotspot as used in the Action feature of PowerPoint is: B. an invisible hyperlink embedded in a slide.

<h3>What is a hotspot?</h3>

A hotspot can be defined as a visual effect that can be applied in Microsoft PowerPoint to content on a slide, so as to make elements (objects) interactive with the end users.

This ultimately implies that, an invisible hyperlink embedded in a slide is a statement which best describes a hotspot as used in the Action feature of PowerPoint.

Read more on PowerPoint here: brainly.com/question/26404012

#SPJ1

5 0
1 year ago
New Top Level Domains (TLDs) are coordinated by:_______.
Marizza181 [45]
ICANN is the answer
7 0
3 years ago
What is zenmap typically used for? how is it related to nmap? describe a scenario in which you would use this type of applicatio
slava [35]

Zenmap is the graphical User Interface representation for NMAP Security Scanner. It is an open-source program designed to make NMAP easy for starters to use. Typically, it is used to collect and identify a list of hosts, OS, as well what services are running on them by using a port scanning tool. It is used specifically for the scanning and vulnerability phase of ethical hacking.

A network administrator who wishes to audit all the devices on a specific IP scheme in a network can use NMAP. The admin can go ahead and scan the ports to know exactly which ports are closed and which are opened.






8 0
3 years ago
Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
Andrew [12]

<u>Man-in-the-middle attack</u> refers to a type of an attack in which an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers.

<u>Explanation:</u>

A man-in-the-middle attack (MITM) is an assault where the aggressor furtively transfers and potentially changes the correspondences between two gatherings who accept that they are straightforwardly speaking with one another. This happens when the assailant catches a segment of a correspondence between two gatherings and retransmits it sometime in the future. The assailant would then be able to screen and perhaps change the substance of messages. The utilization of such encoded burrows makes extra secure layers when you get to your organization's secret systems over connections like Wi-Fi.

8 0
3 years ago
Other questions:
  • Write a paragraph on the orgin or development of ONE of the following elementss of the Internet:
    15·1 answer
  • Tell me the shortcut keys used in Ms PowerPoint ?​
    6·2 answers
  • Give one advantage and two disadvantages of using a wireless network
    8·1 answer
  • This LEGENDARY character made a much-celebrated comeback in 2017. What was the name of the villain he faced in this epic tale?
    7·2 answers
  • what is the purpose of the Outline view in word 2016? check all that apply. 1. editing the format of size and text. 2.working wi
    11·1 answer
  • State all the generations of computers.
    10·2 answers
  • Indicate whether the statement is true or false. ____ 1. Autoglobal array elements are referred to with an index number. ____ 2.
    9·1 answer
  • If you have 60fps on your laptop tell me one way you can go to 240fps
    14·2 answers
  • when you sent email your email can be set to automatically keep a copy where do you find these copies​
    13·1 answer
  • Choose a problem that lends to an implementation that uses dynamic programming. Clearly state the problem and then provide high-
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!