1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergij07 [2.7K]
3 years ago
11

Taylor has to write a letter denying a customer's request for a free replacement on her two-year-old business laptop, which is p

ast its warranty. Which buffer statement is most appropriate for Taylor to use
Computers and Technology
1 answer:
sdas [7]3 years ago
7 0

People often write letters for different reasons. The buffer statement that is most appropriate for Taylor to use is ''I am sorry to hear that your laptop is no longer performing as expected''.

<h3>Buffer statement is simply know too be a statement that is the first aspect of a negative news that comes in form of message either verbal or written.</h3>

It is known to give a neutral or positive information. It is often used by a company when they want to relay <em>bad </em>news  in a letter or other business communication format.

Learn more from

brainly.com/question/1574061

You might be interested in
What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and
Vladimir [108]

Answer:

The specific type of tools that can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security issues are:

1. Arachni

2. Grabber

3. Iron wasp

4. Nogotofail

5. SonarQube

6. SQLMap

7. W3af

8. Wapiti

9. Wfuzz

10. ZedAttack Proxy Zap

Explanation:

The testing tool is capable of uncovering a number of vulnerabilities, to scan small web applications, to uncover over 25 types of web application vulnerabilities, to detect TLS/SSL vulnerabilities and misconfigurations, to measure the source code quality of a web application, to detect and utilize SQL injection vulnerability in a website’s database, to find over 200 types of security issues in web applications, to check web applications for security vulnerabilities.

The security testing tool supports command-line access for advanced users can also be used to intercept a proxy for manually testing a webpage.

5 0
3 years ago
Which of the following is a typical feature of forums but not of review sites?
kkurt [141]
Actually, two options are correct:

They allow private messaging. -  this is your safest option, as review sites don't offer private messaging (many rewiews are anonymous, so that would kill the point), but all forums do.
<span>

You need to sign up to be a member
</span>Actually, this is also true, as many, if not most forums do require you to sign up, so that it is visible whenever a certain person posts again - otherwise you won't know if you're talking to the same person! however, many review sites, for example reviewing doctors, let you post without signing in.
6 0
4 years ago
Read 2 more answers
Why is cpu called the brain of the computer
kogti [31]
~Hello there!

Your question: Why is CPU called the brain of the computer?

Your answer: CPU is called the brain of computer because the CPU carries all the important calculations that helps the computer to process. 

Any queries?

Happy Studying ^=^
6 0
4 years ago
Read 2 more answers
what is the difference between the registry and server manager in reference to its management/configuration ?
Ksivusya [100]

Explanation:

Server manager perform various types management tasks in Microsoft window to manage remote severs without require any physical access. It enable remote desktop connection protocols. It basically use server manager for manage the server remotely.

Registry is very important as it store essential information about the window system and about its configurations. It is mainly use in Microsoft window for operating its system and applications. It also store low level settings in the system.

6 0
3 years ago
URGENT!! What is the most suitable use for bitmap images?
ELEN [110]

B. Photographs

Logos, line drawings, and animations are always better as vector images, which basically means the image has an infinite resolution.

7 0
3 years ago
Read 2 more answers
Other questions:
  • . When you have multiple graphics positioned on a page, you can _______________ them so that they are a single graphic instead o
    9·1 answer
  • why is this message poor or ineffective ,Due to low profits,there will be no annual year-end bonus this year. We hope to have a
    13·2 answers
  • Which option allows you to customize the order of your data ?
    8·2 answers
  • Given an integer variable count, write a statement that displays the value of count on the screen. Do not display anything else
    11·1 answer
  • What is the file extension for an impress file??
    10·1 answer
  • When replacing a system board in a laptop, which feature is a must?
    10·1 answer
  • Which wireless communication is typically limited to six feet of distance?
    14·1 answer
  • From a neural network with 11 input variables, one hidden layer with three hidden units, and one output variable, how many param
    7·1 answer
  • ​
    10·1 answer
  • Susan is a network administrator and is setting up her company's network. In the process to determine an open port on a firewall
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!