1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DIA [1.3K]
3 years ago
8

A brief communication used in businesses is called a _____.

Computers and Technology
2 answers:
Bad White [126]3 years ago
6 0

Answer:

C. Memo

Explanation:

Hope this helps :)

Helga [31]3 years ago
3 0

Answer:

the answer is it is called a memo

You might be interested in
Compare and contrast the TwoFish encryption algorithm with the DES and AES algorithms. In your comparison be sure to compare and
zheka24 [161]

Answer:

The comparison is done based on their basic, principle, plaintext, key size, rounds, rounds name, security and speed. See the attached document.

Explanation:

The the attachment

8 0
4 years ago
30 POINTS FOR THE ANSWER
vladimir2022 [97]

The possible solutions are:

  • Ask for a printed or click on proof to get the  right color match.
  • One can use Pantone colors as it aids with color matching.

<h3>How do one do the above?</h3>

Computers is known to often use the same data and it often uses it to bring up clarity or light up pixels on its screen.

Therefore to get the result above, one need to check system preference system setting to get different brightness and color settings.

Therefore, The possible solutions are:

  • Ask for a printed or click on proof to get the  right color match.
  • One can use Pantone colors as it aids with color matching.

Learn more about printed colors from

brainly.com/question/1548113

#SPJ1

4 0
2 years ago
he IT director asks you to verify that the organization's virtualization technology is implemented securely. What should you do
Kamila [148]

Answer:

Check that virtual machines have always had the upcoming services packs as well as patches set up.

Explanation:

  • Among the very most essential preventive measures, you could even begin taking would be to download the application security relies on upon and splotches. The whole principle applies to routine OS, implementations as well as virtualization software.
  • It would not be appropriate for software applications to have been multihomed even though it will not seem to significantly boost their protection.
  • Penetration testing is being managed to complete before the implementation of virtual servers. Subnetting isn't necessary for virtual servers, and while it may improve safety. It must be factored into the equation during most of the capacity building phase.
7 0
3 years ago
Assume that your body mass index (BMI) program calculated a BMI of 20.6. What would be the value of category after this portion
algol [13]

Answer:

B normal is the answer

5 0
3 years ago
Read 2 more answers
You company has decided to start using AppLocker GPOs to control application access. Jeff, Stormwind’s IT Manager, would like to
miv72 [106K]

Answer:

In the Group Policy Manager, enforce the new AppLocker policy in Audit Only mode.

Explanation:

The organization has chosen to run employing AppLocker GPOs to secure access to applications. Jeff, the Information Technology Manager at the following company, also wants to evaluate the AppLocker strategy until it is implemented.  

So, In Group Policy Manager, Jeff enforces the latest AppLocker strategy to evaluate the AppLocker policy in the Audit-Only zone because he is the IT manager of the company and he wanted to check the following policy.

3 0
3 years ago
Other questions:
  • One form of the IF field is called an If…Then…Else: If a condition is true, then perform an action; else perform a different act
    15·2 answers
  • What is most likely kept in as database
    15·1 answer
  • ________ symbol is used in the "Advanced" section of the time range picker to round down to nearest unit of specified time.
    8·1 answer
  • Given positive integer num_insects, write a while loop that prints that number doubled up to, but without exceeding 100. Follow
    8·1 answer
  • You are working on a router that has established privilege levels that restrict access to certain functions. you discover that y
    5·1 answer
  • Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times
    6·1 answer
  • PLEASE HELP!!!
    12·1 answer
  • Which print setting enables multiple slides to be printed on one page?
    5·2 answers
  • Order the steps for accessing the junk email options in outlook 2016
    14·1 answer
  • What is the extension of Photoshop file?​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!