1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klasskru [66]
3 years ago
12

How many times do you return after the dateline ?

Computers and Technology
1 answer:
Mumz [18]3 years ago
3 0

Answer:

letter?

As for other spacing, it's traditional to double space between the date and the salutation, double space after the salutation, and triple space for the signature. However, it's fine to only double space after the date, especially if doing so will save the letter from running on to a second page.

You might be interested in
____________ is a widely accepted international best practices framework for implementing information systems security.
balandron [24]

Answer:

Control Objectives for Information and related Technology (COBIT)

Explanation:

COBIT is a framework developed by the ISACA for managing and supervising Information Technology processes. Such kinds of frameworks allow companies to position themselves with the expectations that they and their clients expect. COBIT's aim is to provide management and business process owners with an IT control and governance model that helps deliver value from IT and identify and handle the IT-related risks. It helps bridge the gap between business needs, control requirements and technical issues. It is a paradigm of control for addressing the IT governance requirements and maintaining the security of knowledge and information systems. COBIT emphasizes on what allows processes to work well.

8 0
4 years ago
Significant and powerful aspect of java language
Anna11 [10]
Significant and powerful aspect of java is that it is multi threaded. Java can run multiple programs independently and continuously. Applets can run on any browser evenly distributing the cpu process and cpu time. Java is simple, secure and has heavy dynamics.
3 0
3 years ago
A user logs into Active Directory on a workstation and the user home directory does not redirect to a network share on a file se
inysia [295]

Answer:

gpresult

Explanation:

Group Policy provides the system administrator with settings that would be necessary to manage the different user accounts available in an organization. It also controls their work environment centrally by configuring the user Operating System (OS), applications and user accounts.

Group policy settings or configurations are referred to as Group Policy Objects (GPOs). These objects can be linked to organizational units (OUs), domains or sites.

There are various group policy commands such as;

  1. rstrui (System Restore tool will run),
  2. runas (using different permission to run a tool or program),
  3. tasklist (currently running programs are shown
  4. gpupdate (Group policies are refreshed)
  5. gpresult (group policy configurations are displayed for verification)

gpresult command can be used to verify the group policy configurations for adjustment or optimization. The technician can start troubleshooting from viewing the active settings, then running the rstrui to start the System Restore utility to restore the computer to an earlier date

6 0
3 years ago
....is an act of introducing an invention into market on business basis for profit​
jonny [76]

Answer:

Entrepreneurship

Explanation:

6 0
3 years ago
Define and test a function myRange. This function should behave like Python’s standard range function, with the required and opt
Cerrena [4.2K]

Answer:

Study Python’s help on range to determine the names, positions, and what to do with your function’s parameters.

Use a default value of None for the two optional parameters. If these parameters both equal None, then the function has been called with just the stop value. If just the third parameter equals None, then the function has been called with a start value as well. Thus, the first part of the function’s code establishes what the values of the parameters are or should be. The rest of the code uses those values to build a list by counting up or down.

6 0
3 years ago
Read 2 more answers
Other questions:
  • An internal _____ refers to a specific representation of an internal model, using the database constructs supported by the chose
    8·1 answer
  • Me2540 week 5 assignment<br> what do i want to know?
    9·1 answer
  • The most frequently applied heuristic in problem solving is a(an) _________, which involves repeated tests for differences betwe
    13·1 answer
  • As you begin to develop a software application, what is one of the most helpful tools to ensure a quality product?
    12·1 answer
  • Carbon copy others who are..
    14·2 answers
  • Consider the classes below:
    13·1 answer
  • Why does atmospheric pressure does not effect on planes,jet planes and rocket?​
    9·1 answer
  • Which of the following is not a computer application?
    10·2 answers
  • If you play video games, please answer these questions it’s for a survey for my game development class!!
    5·1 answer
  • Write a function assoc_list(l) that, given a list l, returns a list of tuples where the first integer represents the element of
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!