1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wolverine [178]
3 years ago
4

list at least one thing to check for when you're checking the clarity and professionalism of a document.

Computers and Technology
1 answer:
zepelin [54]3 years ago
7 0

Answer:

Basic grammar and spelling

Explanation:

In the midst of everything, whether it is writing a professional email, CV, or business reports, it is always important to proofread your document and check for spelling and grammar mistakes. Grammar and spelling mistakes should be among the first things to check. Skim through your sentences and try not to overlook the very basics of sentence structure and logic. Check punctuation, wording, and many more. Failure to check on these things can not only tarnish the impression of your document but also set you up for failure.

You might be interested in
Software is the brain of computer. Explain this starement
Annette [7]

here you go

i hope this helps you

5 0
3 years ago
Jack lost all the data he saved on his desktop because of a power outage while working on a presentation on which of these compu
Alchen [17]
The hard drive should have saved his data.
5 0
4 years ago
Read 2 more answers
In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
Neporo4naja [7]

Script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

<h3>The types of threat actors.</h3>

In cybersecurity, there are different types of threat actors and these include the following:

  • Script kiddie
  • Gray hat hacker
  • Hacktivists

One of the ways to differentiate an attack orchestrated by a script kiddie from that of a gray hat hacker is that script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

4 0
2 years ago
HELP ASAP!! WILL MARK BRAINLIEST
lesya692 [45]

Answer:20*i

Explanation:

Because the size will expand as its being written out to then have i

4 0
3 years ago
Qwertyuiopasdfghjklzxcvbnm??
vampirchik [111]

Answer:

JIIWIJIDNJFSJJJJJSLIWEOIMFKNFHIUELWJWOIWKL!!!!!!!!!!!! :)

Explanation:

HDHKDJOIWJOWJOWI

6 0
4 years ago
Read 2 more answers
Other questions:
  • You learned about microcomputer a personal computer designed for use by an individual. Perform online research find out the diff
    12·1 answer
  • Which if the following is an effect of intellectual property theft?
    6·2 answers
  • Consider the classes below:
    13·1 answer
  • Cash cows are always in
    7·1 answer
  • How do you print "Hello World" in the console with Python? Wrong Answers Only.
    7·2 answers
  • From a database point of view, the collection of data becomes meaningful only when it reflect
    8·1 answer
  • What is the difference between KE an PE
    8·1 answer
  • What are output statement in QBASIC?
    5·1 answer
  • Answer first get branlest
    10·2 answers
  • program that initialises a vector with the following string values: “what” “book” “is” “that” “you” “are” “reading”.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!