1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novosadov [1.4K]
2 years ago
5

In 5-10 sentences, describe the procedure for responding to an e-mail message.

Computers and Technology
1 answer:
miss Akunina [59]2 years ago
7 0

Answer: See explanation

Explanation:

The procedure fur responding to an email message goes thus:

The first thing to do is to open the website of the email. Then, you would click on "compose".

When you click on compose, you'll see some space where you'll fill some information such as the email of the person that you're sending to, that is, the receiver. You'll also feel the subject of the email.

Then you type the content of your message. When you're done with this, then you click on send.

You might be interested in
Jason works for a restaurant that serves only organic, local produce. What
sergeinik [125]

Answer:

green buisness

Explanation:

8 0
3 years ago
Read 2 more answers
A friend complains that she is always running out of money even though she “never buys anything expensive.” What advice would yo
Paraphin [41]
To not buy anything unless it is 100% necessary.
4 0
3 years ago
Read 2 more answers
New trends, tools, and languages emerge in the field of web technology every day. Discuss the advantages of these trends, tools,
ikadub [295]

Answer:

Explanation:However, with the emergence of several new web development technologies, tools, frameworks, and languages in the last few years, it has now become quite .

7 0
3 years ago
Why computer known as tool of information​
S_A_V [24]

Answer:

because it has the ability to capture the whole information you need or downloaded

8 0
2 years ago
Which is a benefit of owning a desktop computer instead of a laptop?
Setler79 [48]
B) a desktop is less likely to be stolen or damaged
4 0
3 years ago
Read 2 more answers
Other questions:
  • In the two-level directory, if a user refers to a particular file then__________________ Select one: a. only his/her own UFD (us
    7·1 answer
  • Why is there a need to compare and align one's PECs of a successful entrepreneur?
    5·1 answer
  • Tanya is entering the amount of money she has earned from babysitting onto an Excel spreadsheet, but the AutoComplete feature is
    7·1 answer
  • A circuit rated at 6600 watts and 240 volts will draw what ampers.
    6·1 answer
  • Spencer wants to choose a career path that wouldn’t hold him to an office or laboratory. Which of the following career paths wou
    13·2 answers
  • An acronym is a word formed by taking the first letters of the words in a phrase and making a word from them. For example, AGH i
    10·1 answer
  • What term is used to refer to the merging of government services with information technology?
    11·1 answer
  • The table button is present in the ……… tab.​
    14·2 answers
  • When you add encryption to a powerpoint presentation what does it do
    14·1 answer
  • The different languages that follow specific RULES. These languages use commands
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!