1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
2 years ago
6

Lucy was bucking for a promotion. She paid careful attention to the e-mails she sent out to make sure they did not violate netiq

uette guidelines. All the items below describe something she should do when using e-mail except_____.
pls help me i know somone did this

Include lots of exclamation marks to get your point across.


Use a relevant subject line.


Include a signature.


Use spell check in addition to proofreading to reduce mistakes.
Computers and Technology
1 answer:
salantis [7]2 years ago
7 0

Answer: Include lots of exclamation marks to get your point across

Explanation:

When sending an e-mail, we should note that the subject line that should be used should be relevant with regards to the message being passed.

A spell check is also vital in order to reduce mistakes. The use of many exclamation is wrong. That's not professional and should be avoided.

You might be interested in
Is it okay to leave your car running while parked?
diamong [38]
No because the battery will die and it wont run anymore in other cases you would ask another person for help and connect cables to their car.
8 0
3 years ago
25 POINTS! PLEASE ANSWER! Karrie would like to draw attention to some short statements in her document. What is the best way to
Keith_Richards [23]

Answer: I would say D. because it is highlighted text draws the attention of the reader

Explanation:

7 0
3 years ago
Read 2 more answers
[20 pts] Assume that Bob wants to send a secret message to Alice using RSA encryption. (a) [5pts] (Key generation step) Assume A
Kitty [74]

Answer:

a)Yes Alice can pick 11 has value for her public exponent e

b) The value of d when the public exponent e = 3 is 37

c) The cipher c of the Bob’s message m =2 is 8

d) The cipher c of the Bob’s message m =3 is 18

e) The value of m if c = 3  and the public exponent e = 7 is 16

Explanation:

Find attached the explanation

3 0
3 years ago
What does a transistor do?
mixas84 [53]

It Transmits electrical currents. You can use it as an amplifier or switch of currents.

5 0
3 years ago
Read 2 more answers
A ___________ organizes related commands together, under a tab.
notsponge [240]
A menu bar organizes related commands together, under a tab.
So the answer is <span>b. menu bar</span>
8 0
3 years ago
Other questions:
  • Mark, David, Tia, and Ashley are team members in a computer programming class. They have been assigned the task of creating a co
    12·1 answer
  • Use the script below as a starting point to create a Rectangle class. Your rectangle class must have the following methods;A con
    12·1 answer
  • What do i study to become a network engineer?
    11·1 answer
  • Which method deletes a footer from a document?
    9·2 answers
  • Data as a service began with the notion that data quality could happen in a centralized place, cleansing and enriching data and
    15·1 answer
  • PLEASE VERY IMPORTANT Conduct research on graphic design skills in your area and explore the different courses that they offer l
    12·1 answer
  • Hi whats airpods good for
    15·2 answers
  • What does remedy mean
    7·2 answers
  • How many bytes does a common processor require to represent an integer?
    7·1 answer
  • A SOCCER club uses ICT to
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!