1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ira [324]
3 years ago
12

When writing professional emails, it is okay to use emoticons and

Computers and Technology
2 answers:
nekit [7.7K]3 years ago
8 0

Answer:

False

Explanation:

Flura [38]3 years ago
4 0

Answer:

false

Explanation:

You might be interested in
Suppose you were assigned to develop a logical model of the registration system at a school or college. would you be better off
Valentin [98]
<span>Top-down approaches are most often useful when solving problems such as these. Since all the data is already available, taking the overall problem and breaking it down into smaller parts (with more detail as each level is attained) helps to make the overall task easier.</span>
5 0
3 years ago
Narrow margins are helpful for which task?
inessss [21]

Answer: A: fitting the most content on a page

Explanation:

Trust me my guy

6 0
4 years ago
Which option should you select to ignore all tracked changes in a document? To ignore all tracked changes in a document, you sho
garri49 [273]

Track Changes is a way for Microsoft Word to keep track of the changes you make to a document.To ignore all tracked changes in a document, you should select the Final option, on the Track Changes tab in the Review tab.

On the Review tab, use the little menus in the Tracking group. Final: Show Markup or Original: Show Markup will show what changes you have made.

6 0
3 years ago
Read 2 more answers
Which program or security application prevents access between a private and trusted network, and other untrusted networks?
zavuch27 [327]

The answer is a firewall. A firewall is capable of blocking unwanted and/or unauthorized connections from accessing either your computer or your entire network thereby resulting in data loss and information theft.

7 0
3 years ago
Read 2 more answers
14 Convert the<br>following binary<br>numbers to decimal <br>0011​
xeze [42]

Answer:

.

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Host A is sending Host B a large le over a TCP connection. Assume Host B has no data to send Host A. Host B will not send acknow
    14·1 answer
  • Public-key cryptography can be used for encryption (ElGamal for instance) and key exchange. Furthermore, it has some properties
    9·2 answers
  • A large amount of scatter in a scatterplot is a indication that the association between the two variables is
    13·2 answers
  • This assignment will again take the form of a compare/contrast essay. You will use the fresco of Christ Teaching the Apostles in
    14·1 answer
  • 17. Ano ang tawag sa pahina ng Excel?
    12·1 answer
  • Write an algorithm for finding the perimeter of a rectangle
    6·1 answer
  • What is the most popular game design engine today
    7·2 answers
  • How do i delete cookies on a chromebook?
    8·1 answer
  • Do you guys answer questions about cyber security?
    10·1 answer
  • if a user watches a video with event tracking three times in a single session, analytics will count how many unique events?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!