1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lyudmila [28]
3 years ago
15

Which of the following guidelines about the subject line of e-mail messages is most appropriate?

Computers and Technology
2 answers:
alekssr [168]3 years ago
5 0

Answer: 2: Use the subject line wisely to let your reader know the main purpose of the e-mail.

============================================================

Explanation:

The subject line is like the title of a book. You want to give a quick sense of what the email is about, but you also don't want to put the entire contents of the book in the title. The subject line only has so much room. Even less room is available if the reader is checking their email on their mobile device.

Choice 1 is false because subject lines are important. I can't think of a case where you can omit the subject line entirely (ie leave it blank), unless it's a situation where the recipient knows in advance what the topic is about. Though that may be rare.

Choice 3 is false. Yes you want to keep the subject line short, but you also don't want to be cryptic or confusing. If you can get away with using 1 or 2 words, then go ahead and do so. However, you may need more words to convey the topic of the email. Go with what feels right and try to put yourself in the shoes of the person reading your email. Ask yourself "Does this convey the message I want to send?"

Choice 4 is false. As mentioned, you do not want to put the entire email in the subject line. The exception of this rule is that if the email is really really short. For every other case, you should have a fairly short title and then go over the details in the email main body itself.

Vikki [24]3 years ago
4 0

Answer:

Use the subject line wisely to let your reader know the main purpose of the e-mail.

Explanation:

i got it right on edge 2021

You might be interested in
What symbol precedes all structured references in formula autocomplete lists?
Zolol [24]
Structured references make it easier to use formulas with Excel tables by ... Use brackets around specifiers All table, column, and special item ...
4 0
3 years ago
Httpsdiscord.ggBVNuFMgG link is here<br>come and join discord​
DedPeter [7]

Answer:

httpsdiscord.ggBVNuFMgG

5 0
3 years ago
Yo who do u add a pic on here
Juliette [100K]
Go to the me colum when you first open the app
8 0
3 years ago
The dome of Hagia Sophia rests on these curving, triangular features of Byzantine architecture called __________.
kipiarov [429]

Answer:

pendentives

Explanation:

4 0
3 years ago
What tool might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrati
Soloha48 [4]

A tool which might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations is: Whois.

<h3>What is a DNS server?</h3>

A DNS server can be defined as a type of server that is designed and developed to translate domain names into IP addresses, so as to allow end users access websites and other internet resources through a web browser.

This ultimately implies that, a DNS server refers to a type of server that translate requests for domain names into IP addresses.

In this context, we can infer and logically deduce that Whois is a tool which might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations.

Read more on a domain names here: brainly.com/question/19268299

#SPJ1

4 0
1 year ago
Other questions:
  • A cooler with heat pipes, which contain a small amount of liquid that becomes a vapor when heated, allowing heat to be drawn awa
    10·1 answer
  • A collection of facts can be copyrighted, but only if the collection is ____ in a way that causes the resulting work to rise to
    14·1 answer
  • Explain three applications of data mining
    14·1 answer
  • Shelly tells a friend that her computer needs to be fixed because it has been producing a lot of heat and is smoking. Where is t
    10·1 answer
  • What is Quantum Cryptography? How is it different from Public and Private-key transactions?
    6·1 answer
  • How does voting help in a social news site?
    10·1 answer
  • [This is on Edhesive (coding and programming)]
    8·2 answers
  • Consider the code below. When you run this program, what is the output if the temperature is 77.3 degrees Fahrenheit?
    6·1 answer
  • A buffer storage that improve computer performance by reducing access time is​
    13·1 answer
  • Microsoft Word cannot be used to create personalized web<br> pages.<br> OTrue<br> False
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!