1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Art [367]
2 years ago
12

Read the following scenario what type of business letter do you think is required in this situation?

Computers and Technology
2 answers:
grandymaker [24]2 years ago
8 0

Answer:

Cover letter

Explanation:

The type of business letter Melissa and Melrose would need to write is a Cover letter.

The Cover Letter is usually not more than a page document which gives a kind of summary or hint about who individual is and the quality of the individual, while highlighting why an individual is the best fit for the role they are seeking for.

Most recruiters usually make use of the cover letter, as a first hurdle, to screen out applicants especially when applications are much.

Melissa and Melrose, in addition to the resume they would submit for the volunteering job, would need a cover letter.

Sauron [17]2 years ago
8 0

Answer:

cover letter

Explanation:

You might be interested in
How does Google work, why does it work that way?
Oxana [17]

Answer:

Google uses automated programs called spiders or crawlers, just like most search engines, to help generate its search results. Google has a large index of keywords that help determine search results. ... Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

8 0
3 years ago
Read 2 more answers
Hard disk works on the following technologies: (i) Technology used within the hard drive to read & write data to the drive a
Alex787 [66]

Answer:

The green-blue circuit board you can see in the first photo includes the disk controller, a circuit that allows the computer to operate the drive's mechanisms and read/write data to and from it. ... A small hard drive typically has only one platter, but each side of it has a magnetic coating

Explanation:

8 0
2 years ago
An Internet service provider that wants to influence consumers to immediately switch to its service would most likely utilize __
frutty [35]

Answer: Direct competitive

Explanation:

 The direct competitive situation occur when the two and more than two business in the market offering the similar type of services and the products so it automatically increase the level of competition in the market.

According to the question, the internet service is one of the most efficient tool for influence the customers or consumers about their products in the market and when the services are get switched then it utilize the direct competitive in the market.

Therefore, direct competitive is the correct option.

6 0
2 years ago
Protocols used in each layers in each osi reference model
natka813 [3]

The protocols  that are often used in each layers in each OSI reference model are:

Layers                           Protocols

Layer 7- Application          SMTP, HTTP, FTP, POP3, SNMP

Layer 6- Presentation           MPEG, ASCH, SSL, TLS

Layer 5-Session                   NetBIOS, SAP

Layer 4-Transport                      TCP, UDP

Layer 3-Network                IPV5, IPV6, ICMP, IPSEC, ARP, MPLS.

Layer 2-Data Link       RAPA, PPP, Frame Relay, ATM, Fiber Cable.

Layer 1-Physical              RS232, 100BaseTX, ISDN, 11.

<h3>What is OSI Model?</h3>

The OSI Model is known to be a kind of a logical and conceptual framework that tells all about network communication that is often used by systems in an open to interconnection and also in any communication with other forms of systems.

Note that the Open System Interconnection (OSI Model) is one that tells more about a logical network and it is one that also tells about computer packet transfer via the use of various layers of protocols.

Therefore, The protocols  that are often used in each layers in each OSI reference model are:

Layers                           Protocols

Layer 7- Application          SMTP, HTTP, FTP, POP3, SNMP

Layer 6- Presentation            MPEG, ASCH, SSL, TLS

Layer 5-Session                   NetBIOS, SAP

Layer 4-Transport                      TCP, UDP

Layer 3-Network                IPV5, IPV6, ICMP, IPSEC, ARP, MPLS.

Layer 2-Data Link       RAPA, PPP, Frame Relay, ATM, Fiber Cable.

Layer 1-Physical              RS232, 100BaseTX, ISDN, 11.

Learn more about OSI reference model  from

brainly.com/question/12976859

#SPJ1

8 0
1 year ago
What is the size of the array shoeSize? double [] shoeSize = {8.5, 7, 12.5, 9.5, 9, 11.5, 6}
r-ruslan [8.4K]

The size of the array shoeSize? double [] shoeSize = {8.5, 7, 12.5, 9.5, 9, 11.5, 6} is 6

Explanation:

  • Arrays are zero-based : the seven elements of a 7-element array are numbered from 0 to 6. Hence, the size of the array is 6.
  • An array is collection of items stored at memory locations. The main aim of an array is to store multiple items of same type together.
  • An array is a collection of one or more values of the same type. Each value is called an element of the array.
  • The location of an item in an array is known as array indexing.
  • The first array index is 0 or 1 and indexes continue through the natural numbers.
  • The upper bound of an array is generally language and possibly system specific.
  • An array type is a data type that represents a collection of elements each selected by one or more identifying keys that can be computed at run time during program execution.

6 0
2 years ago
Other questions:
  • What types of issues can you most likely resolve by knowing how to access and use the control Panel?
    15·1 answer
  • 2. What is the purpose of an outline? (1 point)
    8·1 answer
  • 9. Name at least two types of hard drives?
    6·1 answer
  • How do the principles behind the Agile Manifesto suggest approaching architecture?A. Architecture emergesB. Architecture is not
    10·1 answer
  • When using linear or reciprocal navigation, what should be the interface include?
    15·1 answer
  • The information provided in text aids can help us to understand a text’s content before we even read it.
    8·1 answer
  • Describe how you would create a Java program that prompted the user to correctly enter a username and password. The username is
    7·1 answer
  • What form of contacts can be shared in Outlook 2016?
    9·2 answers
  • Which platforms are used for mobile apps? Select 4 options.
    7·1 answer
  • What does Amara hope will<br> happen when Dad sits on the sofa?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!