1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiks02 [169]
3 years ago
5

Why is it a good idea not to change the subject line when replying to a message?

Computers and Technology
2 answers:
Lubov Fominskaja [6]3 years ago
8 0

Answer:

C. so that the reply matches with the sender's original message.

Explanation:

The Sender Message Channel Receiver (SMCR) model of communication was developed and created by David Berlo in 1960. SCMR was developed from the Shannon-Weaver model of communication of 1949.

The SCMR model of communication comprises of four (4) main components and these are;

1. <em><u>Sender (S)</u></em>: this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.

2. <em><u>Channel (C)</u></em>: this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.

3. <em><u>Message (M)</u></em>: this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.

4. <em><u>Receiver (R)</u></em>: this is typically the destination of information (message) or the recipient of a message that is being sent from a sender. Thus, the receiver is any individual who is able to read, hear or see and process the message being sent or communicated in the communication process.  

Basically, the communication channel used in SCMR must connect the sender with the desired recipients.

Hence, it is a good idea not to change the subject line when replying to a message, so that the reply matches with the sender's original message.

strojnjashka [21]3 years ago
4 0

Answer:

Explanation:

Its C not B

You might be interested in
Pls help I don’t know the answers
kifflom [539]

Answer:

1. DLL Files.

2. System software repair.

3. Software configuration.

4. Human-computer interaction.

5. A graphical user interface (GUI).

Explanation:

1. DLL Files can become lost or damaged on a computer and prevent it from working correctly. These are important registry files used by various system softwares to perform specific tasks.

2. System software repair is a type of software you can run to help fix computer problems. Some examples are disk defragmenter, regedit, etc.

3. Software configuration means the process of setting up an application and selecting specific options. This is usually done in the settings section of a software application or program.

4. Human-computer interaction is the name of the discipline concerned with the design of optimal user interfaces.

5. A graphical user interface (GUI) is what users make use of to interact with graphical icons and other visual elements in order to accomplish tasks.

4 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
The following is a sequence of undo-log records written by two transactions T and U: &lt; START T&gt;; ; &lt; START U&gt;; ; ; ;
tatiyna

Answer:

Giving that: The following is a sequence of undo-log records written by 2 transactions T and U:

< START T >;

< T,A,10 >;

< START U >;

< U, B, 20 >;

< T, C, 30 >;

< U, D, 40 >;

< Commit U >;

< T, E, 50 >;

< Commit T >;

1. < START U >

      Recovery action in this case will be undo(-1) and undo(0). All restored to its original Value

     log records < T, A, 10 >,  < T, abort >; as written out

2. < T, E, 50 >

      Recovery action in this case will be undo(8) and redo(0). A and C is restored to its original value, B and D are set to 20 and 40

      log records <T, C, 30 >,  < T, A, 10 >,  < T, abort >  are written out

3. < Commit T >

      Recovery action in this case will be redo(7) and redo(4). A and C are set to 10 and 30, B and D are set to 20 and 40

7 0
3 years ago
The enhanced for statement allows you to iterate through the elements of an array or a collection without using a counter. Give
lesya [120]

Answer:

Check the explanation

Explanation:

public class EnhancedForExample {

   public static void main(String[] args) {

       int[] arr = {4, 2, 9, 1, 5, 7};

       for(int num : arr) {

           System.out.println(num);

       }

   }

}

Kindly check the attached image below for the code output.

7 0
4 years ago
Read 2 more answers
An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the comp
adelina 88 [10]

Answer: Data and Insights

Explanation:

Data and Insights in an enterprise platform is very important as it helps users better understand their customers so that they may be able to offer them the best services.

Data allows the platform to capture the data of the customer and insights then curates and consumes the data for analysis. The result of this analysis will enable the company to better understand the customer so that they might be able to offer preferable products.

3 0
3 years ago
Other questions:
  • 48. What is another word for processor?
    7·1 answer
  • An icon in a document preset that looks like the play button on a YT video, what type of document is the preset meant to be used
    13·2 answers
  • What are three steps to use to research relevant information on the internet? (Site 1)
    13·2 answers
  • You are configuring IP settings on a new network. For the external interfaces, you decide to obtain registered IP addresses from
    5·1 answer
  • You have been asked to create a query that will join the Production.Products table with the Production.Categories table. From th
    6·1 answer
  • Universal Containers (UC) has multi-level account hierarchies that represent departments within their major Accounts. Users are
    13·1 answer
  • Lines s, t, and u are perpendicular bisectors of the sides FGH and meet at J. If JG=2x+2, JH=2y-4, JF=8 and HI=3z-3, find x, y,
    15·2 answers
  • Why are object-oriented languages very popular?
    11·2 answers
  • Write a method called removeHighPrice that will go through a provided ArrayList called prices and removes the first price that i
    6·1 answer
  • If I could make a Short Film on any topic it would be...how could that film change the world?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!