1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
3 years ago
13

Netiquette is the

Computers and Technology
1 answer:
e-lub [12.9K]3 years ago
4 0

Answer:

C

Correct or acceptable way of communicating

You might be interested in
What variation pairs a new employee with an employee who has been with the company for 20 years?
Eva8 [605]

The variation pairs a new employee with an old employee usually focus on employee accomplishments, and criteria that employee meets or not.

<h3>What are the Appraisal Methods used to evaluate an employee's performance?</h3>

The behavioral method is known to be one of the ways to check an employee's actions within a given job.

Conclusively, There is also the use of Comparative methods that tends to compare one employee with different employees. The use of Results methods are the ones that looks into  employee accomplishments.

Learn more about variation pairs from

brainly.com/question/19262673

4 0
2 years ago
Read 2 more answers
In addition to developing sketches, computer-aided design programs are used by fashion designers to perform which task?
nikdorinn [45]

Answer:

flat drawing, pattern making development, computerized marker planning and many other fashion designing related aspects.

Explanation:

6 0
2 years ago
List three things to be safer online.
kenny6666 [7]

Answer:

1. do not give out your age

2. don't use your real name unless you are supervised

3.dont put all your information out there

5 0
3 years ago
You're setting up some VMs to test an application you're considering making available to employees of the small company you work
IgorLugansk [536]

Answer:

Snapshots in VirtualBox, Hyper-V, and please check explanation.

Explanation:

You should never test the software on your PC as you never know what virus or threat they bring with them. Even when you are a software company and testing your own new software, you should use the VM, as it is safe. Any adverse effect can be tackled as the VM is made to be destroyed some day.

You can install numerous OS on your VM. The two best are certainly Virtual Box and the Hyper-V from VMWare. Remember, if you dont want to use the licensed version of certain OS, the trial versions are always available for free, and you can install them on the VMs.

There is a snapshot option on the VirtuabBOX. You are only required to create the snapshot after creating and configuring the VM. It supports Windows, Linux and Mac. So you can install almost any OS. However, VMWare Player does not support the Snapshot, but it provides s similar option known as Checkpoints. However, VMware Workstation supports Snapshots, though they might be costly.

If you are on OS X you can make use of Parallels.

However, never enable file sharing, and stay away from Bridge mode as well as never use your original accounts. File sharing will inject the malware if any to all places on network. The bridge mode connects the VM directly to the network, which otherwise remain hidden behind NAT. And use of personal accounts can cost you them, and this can be quite a big loss definitely.  

6 0
3 years ago
Read 2 more answers
Two devices that may be used for creating,storing,and transmitting documents input devices
castortr0y [4]

Answer:

electronic notebook or a pc?

Explanation:

sorry if its wrong of doesnt help

6 0
3 years ago
Other questions:
  • Exposing employee and customer personal data to an untrusted environment is an example of:
    9·1 answer
  • What term refers to a piece of software that interfaces with the hardware on your computer?
    10·2 answers
  • The work principle is not always true<br> T or F
    11·2 answers
  • To insert a column without using commands in any tabs, a user can _____ -click and then click insert column.
    6·2 answers
  • Rerouting traffic using arp poisoning is an attack on ________ of a network.
    8·1 answer
  • Amazon SWF is restricts you to use a specific programming language when setting up a work flow
    8·1 answer
  • Match the keyboard shortcuts to the function they perform
    10·1 answer
  • SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long bee
    7·1 answer
  • How does social network use message to entertain?
    14·1 answer
  • How exactly do you find the circumference by using C++ Programming? I really need a specific answer.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!