1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DIA [1.3K]
3 years ago
8

A brief communication used in businesses is called a _____.

Computers and Technology
2 answers:
Bad White [126]3 years ago
6 0

Answer:

C. Memo

Explanation:

Hope this helps :)

Helga [31]3 years ago
3 0

Answer:

the answer is it is called a memo

You might be interested in
What is my favorite color?<br> Red<br>Orange<br>Yellow<br>Blue <br>Gold<br>Silver
elena-s [515]

Answer:

orange men because I don't know

7 0
3 years ago
What effect did personal computers and internet have on how people acces information
Ganezh [65]
Personal computers made accessing information a lot faster and easier but a lot of times the things we see when we search information is tailored to our personal beliefs and opinions. For example, if you're a person that commonly searches for information or products about dogs, you're way less likely to get an add promoting cat food. While this may seem like a very positive thing, it also may have a downside. This rule also applies to things like political views, if you're a trump supporter you'll most likely end up seeing things that are pro-Trump and a lot fewer things that are pro-Hilary. 

This can skew people's outlooks on certain subjects, if you're only ever seeing web pages and articles saying that Trump is great, you won't ever see the opposing side which is essential in making a well-informed decision about a candidate for the presidency or any other subject for that matter.

In summary, You have to see both the good and bad side of something to truly make a choice and the way the internet works can sometimes make that difficult.


I hope this helps and makes sense! :)
6 0
3 years ago
Read 2 more answers
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
avanturin [10]

Answer:

A. Spoofing

Explanation:

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

IP spoofing involves an attacker trying to gain unauthorised access to a system by sending messages with a fake or "spoofed" IP address to make it look like the message came from a trusted source, such as one on the same internal computer network, for example.

Email spoofing often involves things like requests for personal data or financial transactions. The emails appear to be from trusted senders such as customers, coworkers, or managers but they are actually from cyber criminals who deliberately disguise themselves to gain your trust and your help with the action they want you to take

7 0
3 years ago
Henry has created a software product that manages a database of company clients. He wants to install the software on a client's
UkoKoshka [18]

Answer:

The answer is " Run the software on the original web browser practically".

Explanation:

The Virtual servers enable you to run programming not programmed to the devices. Let's all presume which Henry's software will operate on computers but not on the mac. Since Mac is unable to run this software, it can practically install Linux on MC and install this.

  • The several common software applications such as parallels, VMware, and Virtual machines could be practically used during mac to install windows.
  • Its platform operating system from a macOS software perspective is a true physical computer with almost everything set.
5 0
3 years ago
If you need to multiply 400, 2, and 1 ½, what would you type on the numeric keypad?
balandron [24]
You will type

400*2*1.5

1.5 is another way to say 1 1/2
4 0
3 years ago
Read 2 more answers
Other questions:
  • Which finger types the highlighted keys on a number keypad? A. Third B. First C. Pinky D. Thumb
    7·2 answers
  • Explain what the 35ppm specification means
    13·1 answer
  • Computer maker Dell realized the problems with keeping large inventories, especially because of the fast rate of obsolescence of
    7·1 answer
  • . Write a recursive function names factorial to compute the factorial of the parameter. Also write the main function, where you
    15·1 answer
  • The answer for this question?
    14·1 answer
  • Look at the following form. Which input method is the form using to receive the user's favorite activity? What is your favorite
    12·2 answers
  • Which of the following STEM discoverers developed a new type of computer hardware?
    11·1 answer
  • WILL GIVE BRAINLIEST!!
    12·1 answer
  • Write a program named as reverse.c that reads a message, then prints the reversal of the message. The output of the program shou
    7·1 answer
  • What's the difference between a robot and a machine?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!