1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
3 years ago
13

Netiquette is the

Computers and Technology
1 answer:
e-lub [12.9K]3 years ago
4 0

Answer:

C

Correct or acceptable way of communicating

You might be interested in
After the closing entries have been posted:
Nimfa-mama [501]
Closing entries are entries<span> made at the end of an accounting period to zero out all temporary accounts. The balances are transferred to permanent accounts. 
After the closing entries have been posted:
A. the temporary accounts are zeroed out
Revenues and expenses are transferred to the income Summary Account and then Income Summary is closed to Retained earnings.</span>
7 0
3 years ago
I prefer a job where I am praise for good performance or I am accountable for results
Vera_Pavlovna [14]

Answer:

What?

Explanation:

4 0
3 years ago
The graphic shows a cause and effect organizational aid.
nika2105 [10]

Answer:

gets good grades

3 0
3 years ago
When issued a GFE device, you are required to sign an AUP
pav-90 [236]
GFE stands for Government Furnished Equipment. While AUP is Acceptable Use Policy (AUP). The AUP  should be read and signed by employees annually.  <span><span> </span></span>The statement that "When issued a GFE device, you are required to sign an AUP" is true. 
7 0
3 years ago
Read 2 more answers
Difference between liner land nonlinear presentation​
yuradex [85]

Answer: The linear multimedia will go from the start all the way through to the finish without variation. Non-linear media is the opposite; it doesn't follow that one-way structure and instead allows free movement around all aspects of the multimedia in any order.

3 0
2 years ago
Other questions:
  • Which sentences in the passage show the preventive measures to avoid data breach?
    9·1 answer
  • Which of these can be considered data?
    14·2 answers
  • Question 8 OT TU
    11·1 answer
  • Subnetting is accomplished by borrowing bits from the _____ portion of an ip address and reassigning those bits for use as netwo
    13·1 answer
  • Physical security controls traditionally include obstacles, alarms, lights, guards, cameras, and responders that produce a(n) __
    15·1 answer
  • In wheat, kernel color is determined by additive alleles at two unlinked loci. If two plants, one with dark red kernels (+++– ge
    7·1 answer
  • John works for Internal Computer Specialists, a company that focuses on helping small business owners resolve MIS infrastructure
    12·1 answer
  • 20 points!!!!! Plz answer quickly
    7·1 answer
  • Five technology tools and their uses​
    5·1 answer
  • List 4 criteria of power your house with wind
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!