2. Which of the following is not one of the guidelines for using instant messaging?A.You can use in place of all face-to-face communication.
B.Keep messages short.
C.Never text or send an instant message when you are angry.
D.Use it for casual conversations.​

Answers

Answer 1

Answer:

A. You can use in place of all face-to-face communication.

Explanation:

Hope this helps


Related Questions

grouping keywords into separate lists for different sections for a website is known as

a. researching
b. comparing
c. organizing
d. brainstorming

Answers

Answer:

C

Explanation:

A is when you surf the web for facts.

B is just finding the difference between 2+ things.

D is when you think of a bunch of ideas firsthand before officially planning anything.

Brainliest? (❁´◡`❁)

nadine is the systems administrator for a network with a single subnet. The subnet uses 192.168.1.0 with a mask of 255.255.255.0. The network has 10 servers running Windows Server. Srv1 currently provides both DHCP and DNS services. Nadine wants to increase the fault tolerance for her DHCP servers. She installs a new server, Srv11, and configures it for DHCP. She configures a scope on Srv11 to match the scope on Srv1 and then excludes half of the addresses in the scope on Srv1 and the other half of the addresses on the Srv11. Nadine decides to test her solution and shuts down Srv1. As a test, she forces a workstation to release its IP address and request a new one. She finds that the workstation has the IP address 169.254.0.15 with a mask of 255.255.0.0. What should Nadine do to fix the problem?

Answers

Answer:

Authorize Srv11

Explanation:

In order to fix this problem, Nadine should Authorize Srv11. The problem is most likely being caused due to failure of authorization of the server. This would prevent this server from being on the same scope as Srv1 and therefore, it is why the IPaddress being given is different. DHCP is an automatic protocol and would not be able to provide an IP address in the same scope if the server is not Authorized to do so.

What does input allow a computer to do

Answers

In computer science, the general meaning of input is to provide or give something to the computer, in other words, when a computer or device is receiving a command or signal from outer sources, the event is referred to as input to the device.

A system that connects computers throughout the world is a

Answers

Answer:

Wide Area Network (WAN)

Explanation:

the Internet is the most basic example of a WAN, connecting all computers together around the world. Because of a WAN's vast reach, it is typically owned and maintained by multiple administrators or the public.

Everytime a friend thies. to select something in
Windows, she gets a menue popping up Explain
to her what she is doing whing and why
she
cannot
select the objeto

Answers

Answer:

Please write properly your sentence is incomplete

100POINTS!!!!


Which tool would you use to organize the list from fewest calories to most calories?

Which tool would you use to organize the list from most protein to least protein?

Which tool would you use to show only fruits with 4 or more grams of dietary fiber?

Which tool would you use to navigate to C5, the cell containing the grams of sugar for an orange?

Answers

Answer:

Explanation:

Which tool would you use to organize the list from fewest calories to most calories?

✔ sort by calories from smallest to largest

Which tool would you use to organize the list from most protein to least protein?

✔ sort by protein from largest to smallest

Which tool would you use to show only fruits with 4 or more grams of dietary fiber?

✔ filter

Which tool would you use to navigate to C5, the cell containing the grams of sugar for an orange?

✔ Go To

The answer is in the picture

What is an example of a composite key in a database table?

InvoiceID
CustomerID
ProductID
OrderID + ProductID

Answers

Answer:

b

Explanation:

OrderID + ProductID is an example of a composite key in a database table. The correct option is 4.

What is composite key?

A composite key is a key in a database table that consists of two or more columns that uniquely identify each row.

In a database table, a composite key is the combination of OrderID and ProductID in a table that tracks sales transactions.

Because a single order can contain multiple products and multiple orders can contain the same product, neither column can uniquely identify a row by itself.

However, by combining the two columns, each row can be uniquely identified, ensuring that the data is accurate and complete.

Similarly, a combination of CustomerID and ProductID might be used in a sales system to track the products purchased by each customer.

Thus, the correct option is 4.

For more details regarding composite key, visit:

https://brainly.com/question/10167757

#SPJ3

9.6 Code Practice
Instructions
1
Declare a 4x 5 array called N

Please helppp

Answers

Answer:

See Explanation

Explanation:

The question lacks so many details, as the array type and the programming language is not stated.

Assume that, it is Java:

The rule to follow is:

Data-Type[][]Array-Name = new Data-type[rows][columns]

If the given information is for an array of type integer, the code will be;

int[][] N = new int[4][5]

Where

N = Array-Name

int = Data-type

4 and 5 are the dimensions of the array

Hawaii and japan are examples of islands made by? You have to write it.

Answers

Answer:

Volcanic activity

If someone wanted to talk to a financial institution representative in person they would need to _____.

Answers

Answer:

I am pretty sure its log in onto the websitre but im not sure if its that or go to the financial institution.

Explanation:

GUYS!
YOU GOTTA HELP ME CAUSE IM FLIPPIN OUT

OK SO EARLIER TODAY MY LAPTOP WASNT WORKING SO MY DAD SAID I COULD USE HIS

I HAD TO LOG INTO MY WORD ACC TO DO WORK

AND IT WOULDNT LET ME IN HIS SO I USED MINE

MY MOM HAS SAFTEY SETTINGS ON MY OUTLOOK ACCS

BUT I DIDNT KNOW IT WOULD LOG INTO EVERYTHING I THOUGHT IT WOULD ONLY LOG INTO WORD

S O O IM TRYING TO LOG OUT OF MY ACC

BECAUSE MY DAD IS VV PARTICULAR ABOUT HIS COMPUTER

HES GONNA BE MAD

SO

MY QUESTION IS

DOES ANYONE KNOW HOW TO LOG OUT OF LIKE MICROSOFT ACCS

Answers

Attached is the answer, please look.

Describe an association or rhyming phrase you have used to remember information. Was this a useful technique for you? Why or why not?

Answers

Answer:

I used the names George Clooney and Tim Allen to remember the pairs of nitrogenous bases in DNA.

Explanation:

DNA is composed of nucleotides, however the nucleotides are formed by nitrogenous bases called Adenine, Guanine, Cytosine and Thymine. Each nucleotide has a nitrogenous base, but these bases form pairs, allowing the nucleotides to come together. The pairs are formed solely by Timine and Adenine or Guanine and Cytosine.

As I needed to remember the formation of the pairs to do my biology test, I associated the first letter of each base, with the initials of two famous names.

As Guanina is paired with Cytosine (G-C), I associated this pair with the initial letters of the name George Clooney. As Timina is paired with Adenina (T-A), I associated this pair with the initials of the name Tim Allen.

HURRY GUYS I GOT 3 QUESTIONS LEFT
IM TIMED!!!!!

Which element should be used only when the content simply references the element
a. nav
b. figure
c. hgroup
d. article

Answers

the answer is b i believe

The element that should be used only when the content simply references the element is figure. The correct option is B.

What is element of referencing?

The four components of the author, date, source, and title are all included in reference list entries.

There are four referencing conventions that are frequently used. They go by the names of the Modern Languages Association (MLA), American Psychological Association (APA), Harvard, and Modern Humanities Research Association (MHRA) systems.

In computer programming, a reference is a value that allows a program to access a particular piece of data indirectly, such as the value of a variable or a record, in the computer's memory or in another storage location.

As a result, accessing the data is referred to as dereferencing the reference, and the data is referred to as the reference's referent.

Thus, the correct option is B.

For more details regarding elements of referencing, visit:

https://brainly.com/question/28270502

#SPJ2

How does a filmmaker decide which events to include in a documentary?

Answers

Answer:

A documentary is a film based on facts in which the maker tries to portray an aspect of reality, such as politics, science, society or history, nature or the personal perception of the documentary maker.

Documentaries are informative in nature. Sometimes documentaries attempt to provide an objective picture of a subject. There is a lot of debate about what is objective, because the documentary maker chooses his images from reality, which is in itself a subjective act. In a creative author's documentary, the emphasis is on the subjective vision of the filmmaker.

Therefore, the documentary maker will select the events to include in the documentary according to the approach he or she wants to give to it, be it objective or subjective.

Explain what Fahd did wrong in the scenario below. Fahd is running ten programs at once on his laptop when it suddenly freezes up. To fix this problem, Fahd buys a new battery for his laptop.

Answers

Answer:

Well first off. if the laptop froze that doesn't mean the battery is dead to the point where a simple rest of the laptop wouldn't work out.

Which of the following is not an example of a source of information that contributes to the accumulation of big data

Answers

Answer:

Law enforcement officials request the driver's license history for a suspect they recently apprehended.

Explanation:

The option that doesn't cause accumulation of big data is that Law enforcement officials request the driver's license history for a suspect they recently apprehended.

What causes accumulation of data?

Data is an information that is processed by a computer and can be stored in the computer for future use or reference purposes.

The quantity of data processed by a computer depends on the volume of the raw data that is collected and prepared before processing takes place.

From the given options;

Law enforcement officials request the driver's license history for a suspect they recently apprehended. This is just the data of a single individual which can not cause big data accumulation.

Receivers in cell phones request position information from nearby cell phone towers, and this location information is communicated to cell phone companies. This involves more that one cell phone company therefore can cause accumulation of big data.

Search engine providers store all search terms entered by users. This can cause accumulation of data.

Hundreds of satellites stationed above the earth capture images of the earth’s surface. This can cause accumulation of data.

Therefore data from a single source cannot cause accumulation of big data.

Learn more about data processing here:

https://brainly.com/question/26642156

is someone using social media

Answers

Almost everyone uses social media

Ellie is conducting formal research for a new design project and wants to find demographic information. What source is considered most credible to use for her research?

Wikipedia articles

competitor websites

government data

magazine opinion pieces

Answers

may be wikipedia i’m sorry if it’s wrong ☹️

Answer:

Its governmental data

Explanation:

This OS integrated the processing power of Windows NT with the easy-to-use GUI of Windows 98.


Windows Millennium Edition

Windows 2000

Windows for Workgroups

Windows 3.11

Answers

It’s the first one 3.11.132
Other Questions
Answer with the correct form of the present tenseA mi_____la ropa de cuadros.Group of answer choicesme gustole gustame gustanme gusta help with 15 to 18 with spansih -x+4=-9 help me please A rectangular landing pad measures 20' 25' with a rectangular target on the pad measuring 6' 8'. What is the geometric probability that a model rocket falling randomly on the pad will land in the target? What is this answer write an argument on should why student should to use phone in school Arizona Desert Homes (ADH) constructed a new subdivision during 2020 and 2021 under contract with Cactus Development Co. Relevant data are summarized below: Contract amount $ 3,000,000 Cost: 2020 1,200,000 2021 600,000 Gross profit: 2020 800,000 2021 400,000 Contract billings: 2020 1,500,000 2021 1,500,000 ADH recognizes revenue over time with respect to these contracts. What would be the journal entry made in 2020 to record revenue questions 9 & 10 FAST PLS ITS A TEST! WILL GIVE BRAINLIEST! whats your favorite part of the movie a Cinderella man! Please help worth 10 points How would you define the concept of freedom prior to the Civil War? Identify the slope in y=-1/3x + 2Hint: y = mx + b1. -1/32. 23. -2/34. 1 Ill give brainiest - please help ASAP with WORK FOR IT please and thank you!! :)30 points 11 divided by 6 please help What is the creative strategy for music application. 3+p=8 what the answer?? what is the slope of the line that contains the points (13,2) and (3,-2) Someone please help me with this question I would really appreciate it! What is the correct definition of group team sports?A. Sports in which only one player per team competes at a time, withindividual scores counting toward the team score.O B. Sports consisting of more than one player on the field or court at atime.C. Sports which cannot be played by fewer than five people per team.D. Sports which cannot be played by fewer than ten people per team. Fill this out:To talk about being hungry and thirsty:Tengo harnbreTengo sedTo discuss health:caminarhacer ejercicioyo hagot haceslevantar pesaspara Ia saludpara manterer la salud