1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tems11 [23]
3 years ago
14

Which of the following are characteristics of a good webmail message select all that apply

Computers and Technology
1 answer:
emmainna [20.7K]3 years ago
6 0

add choices please :)


You might be interested in
Describe two methods by which viruses can spread.
vlada-n [284]

Answer:

the two methods that can spread viruses are touching and breathing

Explanation:

When there are viruses being spread breathing near another person can caused it to spread because viruses can travel through air. if the viruse is in your systems coming out through the mouth is one way it can travel to another person. That's why wearing a mask is helpful

The other was is touching. Viruses can travel through physical contact. Is hands arent being wash regularly after eating brushing teeth etc it leaves germs and bacteria which is some of the ways and sometimes the main reason as to how viruses are made or created. That's why washing hands are important

Hope's this helps

6 0
2 years ago
5. Lael is always on the lookout for students who might be interested in running for office in student groups. In cell M2, enter
drek231 [11]

Solution :

It is given that Lael always looks out for the students who are interested in running for the office in a student group.

We use an excel sheet to determine whether a student had already elected to the office of the student group or not.

The formula used for the excel sheet used is :

$=IF(EXACT(K3,"Yes")."ELECTED", "Yes",IF(K3,'Yes),"Yes","No"))$

                K                        L                             M                    N          

   Elected group    Finance certificate            

          Yes                    Yes                              Yes

          No                     Yes                               Yes

          No                      No                                No

6 0
2 years ago
Which of the following information sources was not directly affected by the Telecommunications Act of 1996?
RUDIKE [14]
The answer is 'D', as obvious as it seems...
4 0
3 years ago
What is the seven major components of IT infrastructure?​
Mkey [24]

Answer:

Explanation:

These are the seven major components of IT infrastructure

1. Operating system platforms

2. Networking & telecommunication

3. Computer Hardwares

4. Data storage and management

5. Internet network

6. Consulting and system integeration service

7. Enterprise softwares

These components are necessary in order to run a success business in the IT field.

3 0
3 years ago
Read 2 more answers
When creating an input/output table, where do you enter the formula?
balu736 [363]

When creating an input/output table, where do you enter the formula?  

A. In the input cell

B. In the output cell

C. In the title cell

D. In the table of contents


<u>ans. (B) In the output cell</u>

4 0
3 years ago
Other questions:
  • How does making a phone call differ when using: A public phone A cell phone
    6·1 answer
  • Sarah maintains a blog about her soap-making business, and she has hired someone to create a database for this business. She mak
    6·1 answer
  • You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits m
    13·1 answer
  • Kyle is running out of disk space on his hard drive on a Windows XP Professional system. He has installed and configured a third
    9·2 answers
  • What attracts attention and adds spatial depth to a two-dimensional design.
    9·1 answer
  • Write a Python program that prints your name, CS classes taken (or other relevant experience), and the date on separate lines. U
    5·1 answer
  • Besides earning money why do people work​
    6·2 answers
  • ANYONE WANNA FRIEND ME ON DISCORD ゴRose joestarゴ#2088
    9·1 answer
  • Const x = 0;
    15·1 answer
  • ___________ is some danger that can exploit a vulnerability.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!