1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Talja [164]
3 years ago
12

One problem with using e-mail is that ______. a. It can be perceived as being too casual b. It is never appropriate for business

communication. c. It takes too long to write and send e-mails. d. None of the above
Computers and Technology
1 answer:
Free_Kalibri [48]3 years ago
6 0
I personally feel that e-mail can be used for more business settings and as a more formal approach to things as opposed to a text, but option C seems to be more of an opinion.  I would go with C or D.
You might be interested in
"in troubleshooting a boot problem, what is the advantage of restoring all uefi/bios settings to their default values?"
Alex17521 [72]
When this case would appear, one thing that I would do personally would first, go to the settings, in then, after having this done, I would then "scroll down" to where ti would say "restore (uefi/bios) files, and from there, you would get every value that would would have from the beginning in your chip.

And also, what is truly unique would be the fact that you would be able to choose the "restore point" that you would like for it to appear.
3 0
2 years ago
Determine if x(t) is periodic and determine the fundamental period.
Studentka2010 [4]

Answer:

hdiihgguilmjj jduhuiuedoibb

6 0
3 years ago
When naming a file you should use the ___ instead of a space in a filename
Ymorist [56]
The underscore.
But actually you can use spaces in file names, in many file managers. I think it just shows you a space while it actually saves an underscore, or something like this.
5 0
3 years ago
_____ is confirming the significance of what another person is feeling.
il63 [147K]

Validation: Understanding and showing acceptance for another person                

4 0
3 years ago
Read 2 more answers
Which of the following remote access security technologies performs authentication through a three-way handshake (that is, chall
levacccp [35]

Answer:

CHAP

Explanation:

CHAP allows a client to be authenticated without sending credential information across a network.

7 0
3 years ago
Other questions:
  • Sarah wants to calculate how much of a profit she would make on producing and selling a new product. Sarah should use a _____.
    13·1 answer
  • As the team leader, John ensures that all his teammates are clear in the team goals they need to achieve. He demonstrates the qu
    12·2 answers
  • Write a program that accepts three decimal numbers as input and outputs their sums?​
    5·1 answer
  • Search engines that search other search engines are called
    12·2 answers
  • How do you get free Wifi on your phone without paying
    6·1 answer
  • PLEASE HELP I WILL MARK BRAINIST!!!!!!!!!<br><br><br> What is a rolodex?
    7·1 answer
  • Suppose there are two hosts, S and R. They are communicating over a TCP connection, and R has already received from S al bytes f
    11·1 answer
  • What is the awnser ?
    11·1 answer
  • Kai notices his laptop is running sluggishly, so he wants to check his system resources for any issues. Which utility can he use
    11·2 answers
  • What are the four conditions to help determine whether a website is a good source for information?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!