1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Studentka2010 [4]
3 years ago
14

Typing which capitals and exclamation points in an email is an example of

Computers and Technology
1 answer:
Alexus [3.1K]3 years ago
4 0
It's an example of a poorly written email, it looks like somebody is angry and yelling at you, these types of emails can be described as a poor etiquette.
You might be interested in
Which of the following are typically an example of primary resources?
TiliK225 [7]
I believe the answer is B. Biographies and histories. (Otherwise its D)
5 0
3 years ago
When Mark completed his research paper, he decided that he wanted to have all headings to be in bold, underlined, and 14 points.
MatroZZZ [7]

CTRL/CMD + B (BOLD)

CTRL/CMD + U (Underline)

CTRL/CMD + ] or [ (change font size)

6 0
2 years ago
Values that are sent into a function are called _________.<br><br> Program Output
Semmy [17]

Answer:

Argument

Explanation:

The function is the block of the statement which performs the special task.

when we define the function in the program then we have to call that function.

the syntax for defining the function:

type name(parameter_1, parameter_2,...){

    statement;

}

the syntax for calling the function:

name( argument_1, argument_2,...);

Meaning of parameter and argument

The argument is used to send the value into the function definition. this can be passed by value or pass by reference.

The parameter is used to receive the value send by calling function.

Therefore, the answer is the Argument.

5 0
3 years ago
which endpoint application runs on an endpoint device that only detects an attack in an endpoint device? chqgg
WARRIOR [948]

A host-based intrusion detection system works similarly to a network-based intrusion detection system in that it can monitor and analyze both the internal workings of a computer system and the network packets on its network ports.

<h3>What is Host-Based IPS?</h3>
  • A host-based intrusion detection system works similarly to a network-based intrusion detection system in that it can monitor and analyze both the internal workings of a computer system and the network packets on its network ports.
  • The Host-based Intrusion Prevention System (HIPS) guards against malicious software and other activities that aim to harm your computer. HIPS uses sophisticated behavioral analysis in conjunction with network filtering's detection capabilities to keep track of active programs, files, and registry keys.
  • The integrated endpoint security system known as endpoint detection and response (EDR), also referred to as endpoint threat detection and response (ETDR), combines real-time continuous monitoring and gathering of endpoint data with rules-based automated reaction and analysis capabilities.

To learn more about Host-Based IPS refer to:

brainly.com/question/20490376

#SPJ4

5 0
1 year ago
Which bug type would you suggest for the following bug? The button label "Add to cart" is not fully visible.
harina [27]
Butterfly one I forgot the name metapods evolution
3 0
3 years ago
Other questions:
  • Which code fragment constructs an arrray list named players that is initialized to contain the strings "player 1" and "player 2"
    15·1 answer
  • Which steps would you take to determine how much an employee should be paid? Select all that apply.
    9·1 answer
  • Taking away iPad privileges when a student hits another child would be considered a(an) ________ principle for decreasing or ext
    10·1 answer
  • If the predetermined overhead allocation rate is 245% of direct labor cost, and the Baking Department's direct labor cost for th
    13·1 answer
  • A firm can survive and succeed in the long run if it successfully develops strategies to confront the _______________ that shape
    9·1 answer
  • LAB: Convert to binary - methods
    11·1 answer
  • What is the code i need to do
    12·1 answer
  • Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a
    5·1 answer
  • Which mark is an indicator of invalid data in a cell?
    11·1 answer
  • LAB: Phone number breakdown Given a long long integer representing a 10-digit phone number, output the area code, prefix, and li
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!