1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
QveST [7]
3 years ago
8

1. Why do you need to use sources of information when writing a formal business document?

Computers and Technology
1 answer:
Lera25 [3.4K]3 years ago
4 0

Answer:

You need sources of information when writing a formal business document because, if the person receiving the document would like to see the full source you got your information from it could help them understand better what they are reading. Also it looks more professional.

Explanation:

You might be interested in
Lindsay owns a candy store that typically makes all of its sales to tourists visiting a nearby zoo. Why might she decide to set
umka2103 [35]
Social media is so powerful in this generation because it is able to reach many different corners of the world. It is not only used merely for communication but also sometimes or most of the times for business. For Lindsay, the use of social media will allow her to increase the size of the customer base. The answer is letter A. 
4 0
4 years ago
Read 2 more answers
How are 8-position, 8-contact (8P8C) modular connectors pinned to unshielded twisted-pair (UTP) cable, which is used for connect
AleksandrR [38]

An unshielded cable are twisted pair is used to connect modem in telecommunication industry to connect computer through telephone cable, Ethernet cables it is called as UTP cables.

<u>Explanation:</u>

These UTP cables are twisted cables where conducted are used in form of single circuit.

These types of UTP cables used to connect modem to establish connection to other networks for internet or connecting to other side computer or desktop or laptops.

UTP cables uses  rj-45 or rj-11  or rs232 or rs 499. Normally rs-45 with cat 5e cable is used to connect LAN. Rj-11 is used to connect to modem for dial purpose.

If we use ip networks RJ-45 will do both.

8 0
3 years ago
3 examples of operating systems ​
Citrus2011 [14]

Answer:

Linux, Windows, Macintosh

Explanation:

8 0
3 years ago
What is the treaty of paris
vova2212 [387]

The Treaty of Paris, signed in Paris by representatives of King George III of Great Britain and representatives of the United States of America on September 3, 1783, ended the American Revolutionary War. Hope this helps :)

5 0
3 years ago
Read 2 more answers
Josh, as an administrator for a health care company, is required to support an older, legacy application. He’s concerned about t
IRINA_888 [86]

Answer:

Use an application container.

Explanation:

Host operating system is software installed in a computer that interacts virtually with a server and also describes the difference between its software and a guest operating system.

It interacts with the hardware and works with atype 2 hypervisor which does not interact with the hardware but create virtual machine interfaces for multiple guest operating system to be installed, which are not necessarily the same as the host os.

Host os can also be used to describe  operating systems that make use of container based virtualization. Containers are storage partitions used to hold applications separately on the same server, instead of replicating the operating system.

So with a container, Josh can separate the legacy application from other applications in the server.

8 0
3 years ago
Other questions:
  • A disk rotates at a rate of 7200 revolutions per minute. Seek operations (i.e., moving the access head to a desired track) take
    6·1 answer
  • A benefit of IPsec is __________.
    8·1 answer
  • When you tell an acquaintance your telephone number, you do not recite the digits one by one at a constant rate, as in "3, 3, 7,
    11·1 answer
  • Riya wants to save her project work in an external device so that she can show it to her class teacher. Help her to choose the d
    13·2 answers
  • I don’t understand the double8 coding problem. It is Java
    15·1 answer
  • Kristi, an event planner, wants to store caterers’ names and contact information in an organized manner. Kristi will MOST LIKELY
    13·1 answer
  • What is the code for this please?​
    13·1 answer
  • A security administrator plans to conduct a vulnerability scan on the network to determine if system applications are up to date
    15·1 answer
  • TASK 1. JUMBLE ME! Direction: Arrange the jumbled letters to form a word. 1. PEREAM 2. RRENT CU 3. METREMO H 4. TORSISER 5. TANC
    10·1 answer
  • What symbol do we use to assign a value to a variable or constant in algorithms?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!