The value returned in the number canceled column was 44224. This number represents the total number of canceled bookings.
What is bookings?Bookings is a term used to refer to the process of reserving or booking a service, product, or facility. This can be done through a variety of different methods, including online, over the phone, or in person. Bookings are often used in the hospitality industry to reserve hotel rooms, restaurant tables, and tickets to events. Booking systems have become increasingly popular with the advent of the internet, as they allow customers to book services without having to wait in line, call a customer service representative, or visit a physical location. Bookings also provide customers with a convenient way to check availability, compare prices, and make payment for their purchase.
To learn more about bookings
https://brainly.com/question/29992362
#SPJ1
Chantel wants to keep track of * what she is eating on a daily basis. She would like to enter this data into a word- processing document. Which option would best help Chantel organize this data?
Chantel wants to keep track of what she is eating on a daily basis. She would like to enter this data into a word- processing document.
What is word processing software?A word processing software has been known as an application software that generally provides the facility to write, store, and to modify the documents and just display them on the computer screen and this software also provides a facility to print a document.
Some of these software are the freely available on the internet, that has been used for the word processing, which are the websites.
Therefore, In word processing software we can only use the text documents.
Learn more about software on:
https://brainly.com/question/1022352
#SPJ9
The robotics team wants more than a webpage for on the school website to show off their contest-winning robots. Ruby wants the website to be a wiki so multiple users can work on it. Opal thinks it should be a blog so they can add new posts every week. Who is right?
© Opal is right because a wiki doesn't let users add new posts.
O Ruby is right since blogs can only have one author and one moderator.
• They are both wrong. Blogs and wikis cannot be used for educational purposes.
• They are both right. Wikis and blogs can both get periodic updates and multiple users can work on them.
If the robotics team want to maintain a school website,then as said by ruby wiki would be good because blogs in general will have one author.
What is purpose of Wiki and Blog?
These both are websites which allow users to read content and comment on them. They contain pictures, hyperlinks,vedios and they can be seen by users.
These maintain information about some event.
What makes wiki different from a Blog?
1.Multiple authors
2.Edited by group or team
3.links to other wiki pages.
4.Evolving the same content over time.
When creating a blog it can be generally managed by a single person. But wiki is done by mutliple.
To know more about wiki visit:
https://brainly.com/question/12663960
#SPJ9
application of ai in agriculture
Answer:
Robots for Agriculture: Businesses are creating and programming autonomous robots to perform crucial agricultural tasks, such as harvesting crops more quickly and in greater quantities than human laborers.Crop and Soil Monitoring: Businesses are using computer vision and deep-learning algorithms to process data obtained from drones and/or software-based technology to keep track of the health of their crops and soil.Machine learning (ML) models are being developed to monitor and forecast the effects of various environmental factors, such as weather changes, on crop yield.Emerging AI-driven technologies are addressing industry issues like crop yield, soil health, and herbicide resistance while also helping to increase efficiency. Robotic farming is set to become a highly regarded application of artificial intelligence. It's also conceivable that soon, agricultural robots will be created to carry out a wide range of tasks.
i hope this works......i literally went through the books to find those...lol
Answer:
eriuhewfiuefwuieqwb
Explanation:
Why are the laws proposed by Asimov important?
Answer:
because Asimov’s suggested laws were devised to protect humans from interactions with robots.
Explanation:
The Asimov’s Law of Robotics was introduced as an added help to humans. Asimov envisioned a world where robots would act like servants and would require some programming rules to prevent them from causing harm. In the real world, Asimov’s laws are still referred to as a template for guiding our development of robots.
Question 15 (10 points)
A store has 20 apples in its inventory. How can you store this information in a JavaScript variable?
A 20 = numApples;
B var num apples = 20;
C var numApples = 20;
D var numApples == 20;
Answer:
c
Explanation:
because im right.....
PLEASE HELP! WILL GIVE BRAINLIEST
Answer:
Explanation:find out
What three application layer protocols are part of the tcp/ip protocol suite? (choose three. )
The TCP/IP protocol suite is a collection of communication protocols that are used to connect devices to the internet. It is organized into four layers: application layer, transport layer, internet layer, and network interface layer.
Three of the application layer protocols that are part of the TCP/IP protocol suite are:HTTP (Hypertext Transfer Protocol): This protocol is used to transmit data over the World Wide Web (WWW). It is used for retrieving web pages, images, videos, and other resources from web servers.FTP (File Transfer Protocol): This protocol is used to transfer files between computers on the internet. It is commonly used for downloading files from servers or uploading files to websites.SMTP (Simple Mail Transfer Protocol): This protocol is used for sending and receiving email messages over the internet. It is responsible for transferring emails from one server to another.These three protocols are essential for the communication between applications on different computers on the internet. They provide a standardized way for applications to communicate with each other, ensuring that data is transmitted efficiently and accurately.
To learn more about protocol click the link below:
brainly.com/question/27581708
#SPJ4
100 POINTS TO HELP ME
Your task is to identify two problems that you have encountered with computers. You will identify the problem and what may be causing it and then come up with a possible solution. Describe the steps you would use to diagnosis and solve the issue and what resources you need. Below are some issues you may choose to discuss:
not being able to connect to the Internet
the Internet is running very slowly
not being able to find a particular program
cannot located a saved file
having a slow system
having a slow Internet connection
any other internal problem you may have experienced
a printer not working
a printer jam
a mouse not working
a keyboard not working
I cannot get my digital pictures to upload from my camera.
speakers not working
microphone not working
You may write about experiences you have had personally, or you may choose to research the problems on the Internet. Be sure to use reputable sites, such as those associated with technical associations or well-respected technology magazines. You may choose some of the problems shown above or write about a different one not listed there.
Answer:
Problem 1: Slow Internet connection
Identifying the problem:
Symptoms: Pages are loading slowly, videos are buffering, and downloads are taking longer than usual.
Possible cause: A slow internet connection could be caused by several factors such as high traffic volume, outdated modem or router, signal interference, or incorrect network settings.
Diagnosis and solution:
Check the internet speed: Use an online speed test to check the actual speed of the internet connection. If the speed is much slower than what the service provider promises, contact the service provider to fix the issue.
Check the modem or router: If the modem or router is outdated, it can cause a slow internet connection. Check to see if the device is functioning properly, and update it if necessary.
Check the signal interference: Make sure that the modem or router is placed in a location with a clear signal path and free from interference. Remove any obstacles or electronics that might interfere with the signal.
Check the network settings: Verify that the network settings on the computer or device are configured correctly. For example, if using Wi-Fi, ensure that the network is selected, the password is correct, and the computer is within range.
Resources needed: Internet speed test, updated modem or router, network configuration settings.
Problem 2: Cannot locate a saved file
Identifying the problem:
Symptoms: Unable to locate a saved file on the computer, even though it was previously saved.
Possible cause: The file may have been saved in the wrong location, the file name may have been changed, or the file may have been accidentally deleted.
Diagnosis and solution:
Search for the file: Use the search function on the computer to locate the file by searching for the file name or file type.
Check the file location: Verify that the file was saved in the correct location. If not, search for the file in other folders or drives.
Check the recycle bin: If the file was accidentally deleted, check the recycle bin to see if it can be restored.
Check the file name: If the file name has been changed, search for the file using its original name or the file type.
Resources needed: Search function on the computer, knowledge of where the file was saved, knowledge of the file name and type, recycle bin.
Suppose we are using a three-message mutual authentication protocol, andAlice initiates contact with Bob. Suppose we wish Bob to be a stateless server, and thereforeit is inconvenient to require him to remember the challenge he sent to Alice. Lets modify theexchange so that Alice sends the challenge back to Bob, along with the encrypted challenge. So the protocol is:Step 1: Alice send a message [I’m Alice] to Bob. Step 2: Bob sends a random number, R. Step 3: Alice sends a message [R,KAlice−Bob{R}]. Is this protocol secure?
No, this protocol is not secure. A secure mutual authentication protocol must, among other things, support mutual authentication, which allows both parties to confirm the identities of one another.
Due to the fact that Bob cannot recall the challenge he gave to Alice, he is unable to confirm Alice's identity using this protocol. As a result, an attacker can read Alice and Bob's messages and then pretend to be Alice to Bob by simply playing back the message that Alice originally sent.
This problem can be resolved by changing the protocol so that Bob sends a challenge along with the random number R, and Alice must respond with the challenge as well. This way, Bob can verify Alice's identity by checking if the challenge in Alice's response matches the one he sent earlier.
For such more question on protocol:
https://brainly.com/question/8156649
#SPJ11
I do not understand what the are asking in csys 1. 3. 6
And I would really prefer someone explaining it so I will understand the next one
Without further context, it is difficult to provide a specific answer to what is being asked in csys 1.3.6. However, it is possible that this is a reference to a specific command or function within a particular system or software.
To better understand what is being asked in csys 1.3.6, you may need to provide more information about the system or software you are working with. This could include the context in which the command is being used, any error messages or prompts that appear when you enter the command, and any documentation or resources that may provide additional information about the command.Alternatively, if you are encountering difficulty with a specific task or problem within the system or software, you may want to seek assistance from a support team or online community. They may be able to provide guidance and help you better understand the specific command or function within the system or software.
To learn more about command click the link below:
brainly.com/question/30585049
#SPJ4
1) You are a digital media professional who wants to interview a senator as she stands on the steps of the capitol building. What kind of microphone would you select and why would you choose it ?
As a digital media professional, if I wanted to interview a senator as she stands on the steps of the Capitol building, I would select a directional or shotgun microphone.
A directional or shotgun microphone is a type of microphone that is designed to pick up sound primarily from one direction and reject sounds from other directions. This makes it ideal for outdoor interviews where there may be ambient noise, such as wind or traffic.
By using a directional or shotgun microphone, I can ensure that the senator's voice is captured clearly and with minimal background noise. This is important for the quality of the interview and for the audience's ability to hear and understand the senator's responses.
Additionally, a directional or shotgun microphone can be mounted on a boom pole, making it easy to position the microphone close to the senator's mouth without it being visible in the shot.
Overall, a directional or shotgun microphone would be the best choice for conducting an outdoor interview with a senator on the steps of the Capitol building due to its directional sensitivity, ability to reject ambient noise, and ease of positioning.
You are the IT security administrator for a small corporate network. You are performing vulnerability scans on your network. Mary is the primary administrator for the network and the only person authorized to perform local administrative actions. The company network security policy requires complex passwords for all users. It is also required that Windows Firewall is enabled on all workstations. Sharing personal files is not allowed.
In this lab, your task is to:
Run a vulnerability scan for the Office2 workstation using the Security Evaluator on the taskbar.
Remediate the vulnerabilities found in the vulnerability report on Office2 as follows:
Rename the Administrator account.
Disable the Guest account.
Set the password for the Mary account to expire.
Require a strong password for the Mary account.
Unlock the Susan account.
Remove the Susan account from the Administrators group.
Turn on Windows Firewall for all profiles.
Remove the file share on the MyMusic folder.
Re-run a vulnerability scan to make sure all of the issues are resolved
Answer:
To run a vulnerability scan for the Office2 workstation, you can use the Security Evaluator tool on the taskbar. The Security Evaluator scans the system for vulnerabilities and reports on any security weaknesses found.
Once you have run the vulnerability scan, you will need to remediate any vulnerabilities found. Here are the steps you can take to address the issues mentioned in the lab:
Rename the Administrator account - Change the name of the built-in Administrator account to something other than "Administrator".
Disable the Guest account - Disable the built-in Guest account.
Set the password for the Mary account to expire - Set the password for the Mary account to expire after a specified time period.
Require a strong password for the Mary account - Configure the Mary account to require a strong password, which includes a combination of uppercase and lowercase letters, numbers, and special characters.
Unlock the Susan account - Unlock the user account named Susan.
Remove the Susan account from the Administrators group - Remove the Susan account from the Administrators group and assign her a standard user account instead.
Turn on Windows Firewall for all profiles - Enable the Windows Firewall for all network profiles, including public, private, and domain.
Remove the file share on the MyMusic folder - Disable file sharing on the MyMusic folder and restrict access to authorized users only.
After completing the remediation steps, you can run another vulnerability scan to ensure that all issues have been resolved.
Explanation:
Which of the variables have the value 50 after executing the code segment?
see the image below for reference
The segment of code that will have the value of 50 after executing the code segment is this:
C. X and Z only
What is the segment?A segment is a section of code that instructs the computer to take certain actions. In the above code, we can see that the y value is set to return the value of 50.
Also, in the fourth instruction, the x value is instructed to return the value of y. So, the segment of code that is meant to execute and return the number, 50 is option c which contains x and z.
Learn more about coding here:
https://brainly.com/question/22654163
#SPJ1
Question at position 5 a mathematician develops a program to solve systems of linear equations. When they use distributed computing techniques to run the program on two computers in parallel, they find a speedup of 2. In this case, what does a speedup of 2 indicate? a mathematician develops a program to solve systems of linear equations. When they use distributed computing techniques to run the program on two computers in parallel, they find a speedup of 2. In this case, what does a speedup of 2 indicate? the program completed in two minutes less time with two computers versus one computer. The program completed in half the time with two computers versus one computer. The program completed in twice as much time with two computers versus one computer. The program completed in two minutes more time with two computers versus one computer
A speedup of 2 means that the program completed in half the time with two computers versus one computer. Speedup is a measure of how much faster a program runs on multiple processors compared to a single processor, and a speedup of 2 indicates that the program runs twice as fast on two processors as it does on a single processor.
What does speedup of 2 indicateA speedup of 2 in this case indicates that the program completed in half the time with two computers versus one computer. Speedup is a measure of how much faster a program runs when executed on multiple processors compared to a single processor. A speedup of 2 means that the program runs twice as fast on two processors than on a single processor. In other words, if the program takes T time to complete on a single processor, it takes T/2 time to complete on two processors.
Learn more on processor here;
https://brainly.com/question/474553
#SPJ1
a pneumatic lockout/tagout uses a _________ to prevent use .
Answer:
Lockable Valve
Explanation:
A pneumatic lockout/tagout typically uses a lockable valve to prevent the use of machinery or equipment.
how might b2b and b2c companies approach meeting customer needs differently
Businesses that cater to both B2B (business-to-business) and B2C (business-to-consumer) consumers frequently take a different approach to satisfying their demands because these customers have distinct needs.
What distinguishes B2B customers from B2C clients?What distinguishes B2B e-commerce from B2C e-commerce? Business to business is known as B2B, whereas business to consumer is known as B2C. B2B ecommerce makes use of online channels to market to other businesses. B2C e-commerce focuses on individual customers.
How do the purchasing processes for B2B and B2C differ?B2B: When purchasing a good or service involves business-related goals, the transaction requires a careful study, more thought, and continued support from the seller. Several business divisions are impacted by the choice. B2C: Typically, the sale is less logical
To know more about consumers visit:-
https://brainly.com/question/28671114
#SPJ1
What is the output after this code snippet runs?
int[] scores = {80, 92, 91, 68, 88}; for(int i = 0; i < scores. Length; i--) { System. Out. Println(scores[i]); }
The output of this code snippet is an infinite loop that prints out the elements of the integer array scores in reverse order. The loop condition is i < scores.length, which is always true since i starts at 0 and is decremented in each iteration of the loop. Therefore, the loop will continue to run indefinitely, printing out the elements of the scores array in reverse order, starting with 88, then 68, 91, 92, and finally 80. After 80 is printed, the loop will start again from the end of the array, printing 88, 68, 91, 92, 80, and so on, infinitely.
Ask the user to input a number less than 100. Print all the numbers from 0 to that number. Which loop correctly does this?
Group of answer choices
num = int (input("Enter a number between 1 and 100: "))
c = num
while (num <= c):
print (c)
c = c + 1
num = int (input("Enter a number between 1 and 100: "))
c = 0
while (num <= 0):
print (c)
c = c + 1
num = int (input("Enter a number between 1 and 100: "))
c = 0
while (c <= num):
print (c)
c = c + 1
num = int (input("Enter a number between 1 and 100: "))
c = 0
while (num >= 0):
print (c)
c = c + 1
Answer:
num = int(input("Enter a number between 1 and 100: "))
c = 0
while c <= num:
print(c)
c += 1
Explanation:
This loop correctly prints all the numbers from 0 to the input number because it starts with c = 0 and continues to print and increment c until it reaches the value of num. The other loops either do not initialize c correctly or have incorrect conditions for the while loop to terminate.
Multiple Select Which of the following are advantages of a local area network, as opposed to a wide area network?
Select 3 options.
greater geographic reach
lower cost
provides access to more networks
more secure
higher networks
The advantages of local area network are It has greater geographic reach, Lower cost and Higher speed.
What is Local area Network?
A group of devices connected to one another in a single physical location, such as a building, office, or home, is known as a local area network (LAN).
A LAN can be tiny or big, with one user's home network or hundreds of users and devices in an office or school as examples.
The fact that a LAN connects devices that are located in a single, constrained region is its sole distinguishing feature, regardless of size. A wide area network (WAN) or metropolitan area network (MAN), in contrast, spans a wider geographic area. A few WANs and MANs link numerous LANs collectively.
Therefore, The advantages of local area network are It has greater geographic reach, Lower cost and Higher speed.
To learn more about Local area network, refer to the link:
https://brainly.com/question/15227700
#SPJ1
What are ways to avoid exceeding the mailbox storage quota on a server? Check all that apply.
Use Cleanup tools to archive older messages.
Use Cleanup tools to empty the Deleted Items folder.
Delete messages, and empty the Deleted Items folder.
Save messages in different formats, such as Text Only.
Right-click a message, and move it to the Junk Email folder.
.
Answer:B C E
Explanation:
Mailbox storage consumption can't be decreased by saving messages in various formats, like Text Only, or shifting them to the Junk Email folder.
How can I make my Outlook inbox smaller without removing anything?In the File tab, click. Click Account Settings once more after you've already done so. Click the data file you want to condense on the Data Files tab, then click Settings. To compact now, click.
What distinguishes an Outlook cleanup folder from an empty folder?Empty Folder removes all of the messages from the folder's deleted items and junk email. You can't just get them back. Any unnecessary messages in the current folder are moved to the chosen "Cleanup" folder using the Clean up Folder function. These mails are only moved; they are not destroyed.
To know more about Email visit:-
https://brainly.com/question/14666241
#SPJ1
How do u kiss someone and not feel werid about it afterwards
Answer: just don't kiss someone
Explanation: easy, but if you do then just leave. duh
Did anyone else also do a Gary the snail challenge in CMU?
if so, how did you do the spiral for his shell?
One way to create a spiral is by using a mathematical equation known as the Archimedean spiral. This is a type of spiral that increases in radius at a constant rate as it revolves around a central point.
How to create the spiralTo create the spiral for Gary's shell, you can start by drawing a small circle at the center of the shell.
From there, you can draw a series of lines radiating outward from the center at equal angles.
Then, using the Archimedean spiral equation, you can calculate the radius of each point along the spiral and connect those points with a smooth curve to create the spiral shape.
Read more about programs here:
https://brainly.com/question/26134656
#SPJ1
Which of the following is not an advantage of software-defined networks (SDN) in relation to other types of WAN?
SDN is less vendor-specific.
SDN is more secure.
SDN is directly programmable.
SDN is easier to optimize to meet increasing network traffic.
The statement "SDN is less vendor-specific" is not an advantage of software-defined networks (SDN) in relation to other types of WAN.
What are the SDN's advantages over traditional WANs?
SDN's advantages over traditional WANs include the ability to be directly programmable, easier to optimize for increased network traffic, and improved security due to the centralized control of network policies.
However, the level of vendor-specificity does not necessarily differ between SDN and other types of WAN. It may depend on the specific vendor solutions chosen and the level of integration with other components in the network architecture.
To learn more about software-defined networks (SDN), visit: https://brainly.com/question/29673450
#SPJ1
Use HTLM
1.A circle shape
2. And a semi-circle
3. A and a rectangle
Your animations must have the use of a rotate, and translate, and a scale. Your animations and draws can be as pain or as advanced as you want.
• A pt. for drawing a circle.
• I pt. for drawing a semi-circle.
• A pt. for drawing a rectangle.
• 0+ 1 pt. for using a translation to animate a shape.
• One pt. for using a rotation to animate a shape.
• One pt. for using a scale (dilation) to animate a shape.
Answer: Your welcome!
Explanation:
<svg width="400" height="400">
<circle cx="200" cy="200" r="150" fill="red" />
<defs>
<clipPath id="semiCircle">
<rect x="175" y="175" width="50" height="50" rx="25" ry="25" />
</clipPath>
</defs>
<circle cx="200" cy="200" r="150" fill="blue" clip-path="url(#semiCircle)" />
<rect x="100" y="100" width="200" height="200" fill="green" />
<animateTransform attributeName="transform" attributeType="XML" type="translate" begin="0s" dur="2s" from="0 0" to="200 0" fill="freeze" />
<animateTransform attributeName="transform" attributeType="XML" type="rotate" begin="0s" dur="2s" from="0 0 0" to="360 0 0" fill="freeze" />
<animateTransform attributeName="transform" attributeType="XML" type="scale" begin="0s" dur="2s" from="1 1" to="2 2" fill="freeze" />
</svg>
Question Workspace
Case Project 13-1
You have been asked to create a home automation device that can perform the following functions:
1. Turn a rod connected to window blinds to open or close the blinds. 2. The rod needs to turn about 90 degrees in either direction. 3. The blinds should close when direct sunlight is shining through the window. They should also close when it is dark, but only if someone is in the room. 4. The blinds should open when sunlight is no longer shining through the window but there is still daylight. For now, there is no network connection. Based on the description of the device, what components do you need to complete the project? Select only components that were discussed in this chapter
To complete the home automation device project described in Case Project 13-1, the following components may be required:Motor: A motor is required to rotate the rod that opens and closes the window blinds.
A servo motor or stepper motor can be used to achieve the required 90-degree rotation.Light Sensor: A light sensor is required to detect the amount of sunlight entering the room. This information is used to determine when to open or close the blinds. A photoresistor or photodiode can be used as a light sensor.Passive Infrared (PIR) Sensor: A PIR sensor is used to detect human presence in the room. This information is used to determine whether to close the blinds when it is dark. A PIR sensor can detect the heat signature of humans in the room.Microcontroller: A microcontroller is required to process the input from the light sensor and PIR sensor and control the motor to open or close the blinds. An Arduino or Raspberry Pi can be used as a microcontroller.Power Supply: A power supply is required to provide power to the motor, microcontroller, and sensors. A 5V power supply can be used to power the microcontroller and sensors, while a separate 12V power supply can be used to power the motor.These are some of the components that may be required to complete the home automation device project described in Case Project 13-1, based on the information provided.
To learn more about automation click the link below:
brainly.com/question/13261025
#SPJ4
Network Layout
design a network and create a topology diagram. This diagram will show the logical layout of ther network.
In that class you talked about logical and physical topologies. create a network map for all these servers windows server, linux server, window workstation network map
A Domain Control
RDP
AD
DNS
Should have DNS entries for entire network
A Windows Professional Workstation (Joined to the Domain)
RDP
SSH Linux Server
SSH
You will need to show how the connect, their hostnames, Ips and subnet.
Deliverables:
Network Map
Includes icons deafferenting networking devices from servers from workstations
Hostname for each device or endpoint
IP address and CIDR noted subnet mask
Answer:
Network Layout:
The network will consist of a single domain with a Windows Server acting as a domain controller, running RDP, AD, and DNS services. The DNS server should have DNS entries for the entire network.
There will be a Windows Professional Workstation that will be joined to the domain, allowing users to access network resources and services.
Additionally, there will be a Linux Server with SSH access.
Topology Diagram:
The logical topology diagram for this network will consist of a single star topology with the Windows Server acting as the central hub. The Windows Professional Workstation and Linux Server will connect to the server via switches or routers. Each device or endpoint will have a unique hostname and IP address with the corresponding CIDR noted subnet mask.
Please note that the actual network layout and topology diagram may vary depending on the specific requirements and configurations of the network.
Explanation:
Brady has a general topic he wants to research for his next paper, but he needs to define exactly what his research will address. What should he do next?
A.
develop a research question
B.
choose his sources
C.
write a bibliography
D.
select search parameters
Answer:The next step for Brady is to develop a research question. A general topic is usually too broad for research, and defining a specific research question helps to narrow the focus of the research and provide a clear direction. The research question should be a clear, specific, and answerable question that defines the purpose of the research. Once Brady has developed his research question, he can then proceed to choose his sources, select search parameters, and write a bibliography based on the specific research question he has developed. Therefore, the correct answer is A. develop a research question.
Explanation:
Imagine that your manager has asked you to write an email to all department heads. What are three important questions you should ask her before you start writing to ensure you create the most effective communication?
5 Sentences
The three important questions you should ask her before start writing most effective question is 1. What is the email's primary objective?
2. Is there any particular information or subject matter that ought to be included in the email?
3. Who is the email intended recipient?
Why is email such a useful communication tool?
Email provides a virtual paper trail of conversations and interactions that can be easily searched. Anyone with an internet connection can access email. An email message can be sent to multiple recipients at once. Email gives recipients time to consider the message and respond thoughtfully.
What is the purpose of email communication?The internet-based exchange of computer-stored messages between one user and one or more recipients is known as electronic mail. Emails are a quick, low-cost, and easy way to communicate for personal or business purposes.
Learn more about Email communication :
brainly.com/question/20731943
#SPJ1
OneDrive
Fles
De
Send her an email with the presentation attached
While it's been a long day, you're excited to present your idea tomorrow and see what the managers
think. Just as you're ready to shut down your computer, you remember that your boss wants to look
over the presentation this evening at home. How can you get it to her?
To send the presentation to your supervisor, use OneDrive. The presentation should be uploaded to your OneDrive account. Choose "Share" from the context menu when you right-click on the presentation.
How can a presentation be uploaded to OneDrive?Choose File > Save As. Choose OneDrive. Save personal and professional files to your company's OneDrive by saving them there. You can also save somewhere else, such as your device.
How can I add a OneDrive video to PowerPoint?Click the slide in Normal view where you wish to embed the video. Click the arrow next to "Video" in the Media group of the Insert tab. Choose Video from file, then select the video by browsing to its location. Click the down arrow on the Insert button.
To know more about OneDrive visit:-
https://brainly.com/question/17163678
#SPJ1
Sheila wanted to contact her instructor and wondered what form of communication to use. Why should she avoid using text messages when communicating with her instructor?
A.
The instructor might not have a cell phone to receive texts.
B.
Emails are easier to use and understand for most people.
C.
It is typically considered impolite or too informal.
D.
The instructor might not understand your text speech.
Answer: The answer is C Am not 100% sure but if it's is right your welcome.
Explanation: because It is considered impolite or too informal and also using emails is helpful because it is quick and conversational. Students who text with friends often adopt shortcuts, such as not spelling out full words, ignoring capitalization and punctuation, and not focusing on grammar. So Sheila should use emails instead. Hope it helps!