1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeu [11.5K]
3 years ago
5

Josh wrote the following e-mail to his co-worker. PLEASE HELP QUWICK

Computers and Technology
2 answers:
sattari [20]3 years ago
5 0
D because he is sending a email to his coworker making it workplace communication
Vedmedyk [2.9K]3 years ago
3 0

Answer:

Answer choice 4

Explanation:

If Josh sends an e-mail to his... co-<em>worker</em>.... wouldn't that be... <em>work</em>place communication?

You might be interested in
A site structure that contains multiple links to individual pages, allowing visitors to go through multiple paths to the site is
DanielleElmas [232]

Answer:

A site structure that contains multiple links to individual pages, allowing visitors to go through multiple paths to the site is called <u>Multidimensional website architecture</u>

Explanation:

There are different types of website architecture. One of them is multidimensional website architecture. In Multidimensional architecture, Multiple links of the websites pages are given on the a page and each page contain the multiple links of the website. in this architecture from any page of the website we can access the other page of the website.

for example

On Wikipedia, we search some topic named as website architecture, the website architecture shows on the screen. On this page, there are different link of pages such as sequential website architecture, multidimensional website architecture and Hierarchical website architecture. If click one of the link such as Hierarchical website architecture, the page of Hierarchical website architecture will open and show on the screen. This page also contains different pages links. These links may include the main page link of website architecture. This is called Multidimensional Architecture.

7 0
3 years ago
i see tabs named mowed and Ramsey i tried shredding them and deleting them and ending all the processes but they start duplicati
VikaD [51]

1.Select the data.

2.Go to Data –> Data Tools –> Remove Duplicates.

3.In the Remove Duplicates dialog box: If your data has headers, make sure the 'My data has headers' option is checked. Make sure the column is selected (in this case there is only one column).

4 0
3 years ago
Which of the following statements is true of infrastructure?
bazaltina [42]

Answer:

Examples of infrastructure include transportation systems, communication networks, sewage, water, and electric systems. Projects related to infrastructure improvements may be funded publicly, privately, or through public-private partnerships.

3 0
2 years ago
I need help with this​
Elodia [21]
The answer is number 2.
8 0
3 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Other questions:
  • To insert a new slide in an existing presentation, what menu should you select?
    5·2 answers
  • What were precomputed tables and why were they necessary?​
    12·2 answers
  • _____________ is the characteristic of a resource that ensures that access is restricted to only permitted users, applications,
    14·1 answer
  • Fill in the correct term to complete the statement. _____ refers to borrowing money from a bank.
    13·2 answers
  • (In C prog.) What is the difference between scanf, getche and getchar?
    12·1 answer
  • A(n ____ enables a database administrator to define schema components.
    10·1 answer
  • When classified data is sent over an unclassified network, what is this incident called?
    5·1 answer
  • when inserting a bibliography one choose from multiple ______ of bibliographies.[insert Bibliography]
    12·1 answer
  • A type of user interface that features on- screen objects, such a menus and icons, manipulated by a mouse.
    7·1 answer
  • What does this comparison block indicate?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!