1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Studentka2010 [4]
3 years ago
14

Typing which capitals and exclamation points in an email is an example of

Computers and Technology
1 answer:
Alexus [3.1K]3 years ago
4 0
It's an example of a poorly written email, it looks like somebody is angry and yelling at you, these types of emails can be described as a poor etiquette.
You might be interested in
Summarize the five stages of cultural shock
Anton [14]
1. Honeymoon stage
2. Distress and anxiety
3. Adjustment
4. Adaption
5. Re-entry shock
8 0
3 years ago
Read 2 more answers
PLS HELP!! 50 Points! Will mark correct answer brainliest!!
Illusion [34]

Answer: C

Explanation:

That way she can have slides for her advance class and leave out slides that her normal class doesn’t need

5 0
3 years ago
Read 2 more answers
The U.S. National Institute of Standards and Technology defines the incident response life cycle as having four main processes:
GuDViN [60]

Answer:

C. Post-incident activity.

Explanation:

An incident is a event of intrusion or attack or violation of an attempt of an attack. An incident response is an opposing response to an attack or violation.

An incident response life cycle are stages followed to mitigate a current attack or violation. The stages of the incident response life cycle are, preparation, detection and analysis, containing and eradicating and recovery, and post incident activity.

7 0
3 years ago
Which of the following grinding methods is best suited to a shorter cylindrical workpiece?
schepotkina [342]
well i dont know but i would go with b :D

4 0
3 years ago
A user from the financial aid office is having trouble interacting with the finaid directory on the university's ERP system. The
Harlamova29_29 [7]

Answer:

A. The permissions on the finaid directory should be drwxrwxrwx.

Explanation:

The financial aid system is developed to record the fund inflow and outflows. The ERP system of the university has finaid system on which commands are run and output is received. The permissions on the finaid directory should be drwxr to enable the users to run the commands.

5 0
3 years ago
Other questions:
  • Regarding an intrusion detection system (IDS), stateful matching looks for specific sequences appearing across several packets i
    9·1 answer
  • What is Mars internal composition
    7·1 answer
  • FS and GS are two___________________ in protected mode.
    14·1 answer
  • Hannah decides to burn her video portfolio to a DVD. She wants to hand it over to a movie producer she will meet at a social eve
    15·1 answer
  • Write a method that takes a RegularPolygon as a parameter, sets its number of sides to a random integer between 10 and 20 inclus
    10·1 answer
  • Write a program that defines an array of integers and a pointer to an integer. Make the pointer point to the beginning of the ar
    12·1 answer
  • Can you please help me
    9·1 answer
  • Denise found a volume of documents in the trash bin that contained individuals, names, social security numbers and years of birt
    14·1 answer
  • What is a computer please tell me ​
    10·2 answers
  • Windows is a GUI Operating System, what is the other type?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!