In a email to a client, Luis is requesting that they follow up with him by phone at their earliest convenience. Which feature will Luis want to use to provide his contact information?
a. closing
b. signature block
c. subject line
d. to

Answers

Answer 1

Answer: signature block

Explanation:


Related Questions

What is the full form of GIGO?​

Answers

Garbage in garbage out

Use the drop-down menus to complete the steps for creating a new note.

1. Open the Notes view by clicking Notes in the

2. Click New Note and type the information.

3. Change the
to categorize the note.

4.
off of the note to save it on the Notes view.

Answers

Answer:

✔ Navigation bar

✔ color

✔ Left-click

Explanation:

on edg

Answer:

1. Open the Notes view by clicking Notes in the Navigation bar

2. Click New Note and type the information.

3. Change the color to categorize the note.

4.  Left-click off of the note to save it on the Notes view.

Explanation:

These are the answers from Edge2020

help me please, thanks :)
will mark brainliest btw

Answers

benifits Ease of Access to Information. The World Wide Web, abbreviated as www has made the world a social village. Saves Time. Ease of Mobility. Better Communication Means. Cost Efficiency.  Innovation In Many Fields. Improved Banking Better Learning Techniques.

risks Theft or manipulation of sensitive or private information, such as financial or health records.

Virulent computer viruses that can destroy data, damage hardware, cripple systems and disrupt a business' operations.

Computer fraud.

List 2 benefits of printing in pla filament

Answers

Answer: Advantages of PLA include:
Low printing temperature: PLA has a relatively low printing temperature compared to other thermoplastics (e.g. for PLA an ideal printing temperature starts from around 180°C, while ABS this is around 250°C). ...
Ease of use: PLA is one of the easiest material filaments to 3D print with






Kinda gave more than 2 but hope it helped you ! ;)

In what ways are Outlook notes useful for personal or professional use? Check all that apply.

Notes can be dragged and dropped onto your computer desktop.
Notes can be saved as an Outlook item in a Contact or Calendar Event.
Notes can send reminders for important tasks and events.
Notes are useful for saving hard-to-remember information.
Notes can be used for taking meeting notes.
Notes can save file attachments and pictures.

Answers

Answer:

a b d e on edge 2020.........

Notes can be dragged and dropped onto your computer desktop. Notes can be saved as an Outlook item in a Contact or Calendar Event. Notes are useful for saving hard-to-remember information. Notes can be used for taking meeting notes. The correct options are A, B, D, and E.

What are Outlook notes?

The preferred email client for sending and receiving emails from Microsoft Exchange Server is Microsoft Outlook. Accessibility to contact, email, calendar, and task management tools is also provided by Outlook.

You can send and receive emails, manage your calendar, add and remove contacts, and keep track of projects with Outlook.

The counterpart of physical sticky notes in computer form is a note. Use notes to scribble down everything you would write on paper, including inquiries, ideas, reminders, and more. While working, one can leave notes open on the screen.

You can drag and drop notes onto the desktop of your computer. Notes may be saved in a Contact or Calendar Event as an Outlook item.

Hard-to-remember information can be saved in notes. You can utilise notes to record meeting minutes.

Thus, the correct options are A, B, D, and E.

For more details regarding Outlook, visit:

https://brainly.com/question/13040097

#SPJ2

What does the shell of an operating system do? changes the operating system so that it can be installed on smartphones

Answers

Answer:

The shell of an operating system is the main base for many things.

Explanation:

The "shell" is the place where you can control the operating system in ways that your typical keyboard/mouse user could not. PC or Mac operating systems cannot be installed on smartphones, however, with a tablet, you can remotely control a computer.

Answer:

Your interface to the operating system is called a shell. The shell is the outermost layer of the operating system. Shells incorporate a programming language to control processes and files, as well as to start and control other programs.

-Thanks

Vote Brainliest

What type of file is MyFile.exe?

Answers

The file type is excel

Answer: executable

Explanation:

Which of the following elements does the cinematographer have to be concerned with? (Select all that apply).


balance of light and dark

film distribution

selection of actors

depth of focus

Answers

Answer:

A cinematographer has to be concerned with the balance of light and dark and depth of focus.

Answer:

a: depth of focus

b: balance of light

Explanation:

edg2021

Suppose you have a word processing application on your smartphone, your tablet, and your laptop. You are at home, and you need to write a paper for a class. A [_____] would be easiest to use for writing your paper.
the words you can use are
desktop
tablet
smartphone

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct option for the fill-in-blank of this question is desktop.

Because you can easily use the word application using the desktop. You can also use tablet and smartphone for writing a paper on a word processing application.  But you cannot comfortably and easily write the paper as compared to using the desktop for writing the paper. Furthermore, some wordprocessing features are limited in tablets and in smartphones as compared to desktop wordprocessing application.

So a desktop wordprocessor would be easiest to use for writing your paper.

Answer:

It's "Laptop"

Explanation:

Which term describes the degree to which a network can continue to function despite one or more of its processes or components breaking or being unavailable?

fault-tolerance

file tolerance

fault-line

file protection

Answers

Answer:

the answer is fault tolerance

Explanation:

Answer:

fault-tolerance

Explanation:

On Edge, fault-tolerance is described as the degree to which a network can continue to function despite one or more of its processes or components breaking or being unavailable.

I hope this helped!

Good luck <3

1
Match the following document file types with the suitable descriptions.
Document file type
Description
(a) TXT file
• (i) It can be edited by Microsoft Word 2010.
(b) PDF file
(ii) It can be opened in OpenOffice.org Writer.
(c) DOCX file
• (iii) It can be shared on the Internet easily.
(d) Google document
(iv) It can be opened by most word processors.
(e) ODT file
. (v) Its content and layout cannot be edited by
an ordinary word
processor.​

Answers

Answer:

a-i b-II c-III d-iv e-v

Complete the statement below using the correct term.

All digital devices use software programs to function. Software
create these programs.

Answers

Answer:

System software and Application software

Explanation:

System software Includes Operating System, Database Management Systems, and Software Utilities

Application software Includes performance of a particular application

Which of the following quantities has decreased with the advent of digital technology? attendance at live performances quality of music production cost of performance advertising longevity of established artists

Answers

Answer:

A. The correct answer is attendance at live performances.

Explanation:

took it on edge 2020

The human brain can store both temporary and permanent bits of information. Which type of memory in the computer is similar to the temporary storage in your brain?

BIOS
PRM
RAM
ROM

Answers

Answer:

RAM

Explanation:

"RAM" refers to Random-Access Memory. Just like the human brain, this stores your computer files temporarily. It is considered to be a "volatile memory" which means that information can only be stored when there's power. So, when your computer shuts down, the information is lost. This is similar to the human brain, especially when it comes to learning. When a person learns new things, some of the information he read before may be forgotten.

Which type of memory resides within a computer's CPU?
_____ memory resides within a computer's CPU.
(not multiple choice)

Answers

Main memory.

Main memory resides within a computer's CPU.

Answer:

Internal

Explanation:

Which computer program offers a comprehensive collection of tools for creating digital art by using a variety of shapes, lines, and letters which can be easily measured and formatted?​

Answers

Answer:

LibreOffice Draw

Explanation:

Answer:

A

Explanation:

What is the definition of delimited text?

Answers

Answer:

A delimited text file is a method of representing a table of data in a text file using characters to indicate a structure of columns and rows. This is typically used to provide an import/export function for services, software and databases that represents data in a neutral format. The following are common types of delimited text file. Hope this helps!

Answer:

Characters are separated by commas or tabs.

Explanation:

I just did it on edg 2020

$ sgin is user for absolute referencing​

Answers

Answer:

money

Explanation:

Answer:

Unlike relative references, absolute references do not change when copied or filled. You can use an absolute reference to keep a row and/or column constant. An absolute reference is designated in a formula by the addition of a dollar sign ($) before the column and row.

Explanation:

Which of the following is not a thing needed to make a network?
a)Network software b)Network devices c)Motherboard d)Cables

Answers

Answer:

d) cables is your answer

Answer:

Motherboard is not a thing needed to make network

When comparing programming languages, what is commonly used by all software developers?

elements, controls, and variables
variables, loops, and nouns
elements, commands, and variables
variable, loops, and tags

Answers

Answer:

The answer to this question is given below in the explanation section

Explanation:

This question is about when comparing programming languages, what is commonly used by all software developers?  The correct answer is elements, controls, and variables.

elements, controls, and variables

Every programmer used these three elements, controls, and variables. for example elements are buttons, link, input field etc, controls are loops and decision statements and variables are to store value for some object. so, elements, controls, and variables are most commonly used by all software developers.

variables, loops, and nouns  (false)

this is not correct, because nouns are not most commonly used by all developers. However, it is noted that a noun is used mostly in the requirement elicitation phase for capturing objects.

elements, commands, and variables (false)

commands are not most commonly used by developers, commands are used by those programmers who are doing console programming.

variable, loops, and tag (false)

tag are used in HTML language but it is not most commonly used by the developers.

what is part of computer

Answers

Answer:

CPU, GPU, SSD or HDD, Cooler for CPU, RAM, and power supply.


If i missed something please let me know

Answer:

The parts of a computer are listed below;

MonitorCPU (computer processing unit)KeyboardMouseSpeaker.

What is a help desk
technician?
O An individual who troubleshoots and repairs smartphone hardware components
O An individual who manages and maintains network servers
O An individual who diagnoses and resolves users' technical hardware and software problems
An individual who manages and maintains a network infrastructure

Answers

Answer:

C: An individual who diagnoses and resolves users' technical hardware and software problems

Which is the best reason for why it is important to keep personal information private online?
to prevent becoming the target of a scam
to ensure strangers do not approach them
to prevent others from using it dishonestly
to stop people from following them online

Answers

Answer:

A. To prevent becoming the target of a scam

Explanation:

The more person information you put out on the internet, the easier it is for people to steal it and use it for malicious purposes.

Answer:

To prevent others from using it dishonestly.

Explanation:

Keeping private information to yourself is always a safe approach. Giving out your private information could result in false behavior on your account.

Carl wants to add a new slide to his PowerPoint presentation. Which option should he use?

On the Insert tab, click the Insert New command.
On the Insert tab, click the Add New command.
On the Home tab, click the New Slide command.
On the Home tab, click the Arrange command.

Answers

Answer:

C on edg

Explanation:

I just took the review

Answer:

On the Home tab, click the New Slide command

Explanation:

dont laugh . How do I get a bee out of my but?

Answers

Answer:

i'd get that checked out by a doctor asap!

Explanation:

please go to the doctor or tell your parents!

Answer:

I-

Explanation:

Just go to the doctor. And how did it get there in the first place? Also cant tell if this is a joke or not lol

Why do you think they added the wait .5 seconds block?

Answers

Answer:

Satisfaction

Explanation:

People enjoy the sensation of the computer doing something and the feeling that the program is advanced.

What is cognitive overload?
A. The notion that too many images can create fatigue in the
audience.
B. The concept that too much textual information needs to be
balanced with media.
O C. A state of confusion brought on by a person processing too mu
information at once.
O D. A theory backed by current research that states that the human
mind can only comprehend five new concepts in an hour.

Answers

Answer:

C

Explanation:

C mentions the brain being overloaded

Statement that can be considered as true statement about cognitive overload is C. A state of confusion brought on by a person processing too much information at once.

Cognitive overload can be regarded as used amount of working memory resources. It involves giving more than expected load to the memory.

When this takes place, individual will find it difficult in processing informations, and this could be intrinsic cognitive load.

Therefore, option C is correct.

Learn more at:

https://brainly.com/question/15094030?referrer=searchResults

Which of the following is a way to keep you safe online? (select all that apply)

set up a spam folder
give out personal information to strangers
only open e-mails from people you know
keep anti-virus software up to date

Answers

Answer:

1). set up a spam folder

3).only open e-mails from people you know

4).keep anti-virus software up to date

Explanation:

IM DIFFERENT BREEED!

The options that are a way to keep you safe online are:

Set up a spam folder.Only open e-mails from people you know.Keep anti-virus software up to date.

What ways can keep you safe online?

When a person keep their personal information private and from online views, one can be able to keep themselves safe.

Conclusively, Note that a lot of  Hackers do make use of the profile of people on social media and as such, doing  the above things can help keep you safe.

Learn more about online from

https://brainly.com/question/2014724

#SPJ2

What is a goal for a good programmer?

a. writing efficient code

b. force the computer to multitask

c. to increase the memory in a computer

d. name applications

Answers

Answer:

A. Writing efficient code.

Hope this helps!

this device can be used to type documents,send email,browse the internet,handle spreadsheets,do presentations,play games,and more.​

Answers

A computer is an electronic device that manipulates information, or "data." It has the ability to store, retrieve, and process data. You can use a computer to type documents, send email, and browse the internet. You can also use it to handle spreadsheets, accounting, database management, presentations, games, and more. A computer is an electronic machine that has the ability to receive data and process it into valuable information that it stores in different storage media, and is often able to exchange these results and information with other compatible devices. And the fastest computers today are able to perform hundreds of billions of mathematical and logical operations in a few seconds. It’s computer because the definition of a computer is A computer is a machine that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming. Modern computers have the ability to follow generalized sets of operations, called programs. These programs enable computers to perform an extremely wide range of tasks.
Other Questions
Complete the Lewis Dot structure for the molecule H-CN and determine how many bonding and non-bonding electrons nitrogen has: Zach's baseball team is raising money for a charity. Zach is tasked with raising at least $250. If represents the amount of money Zach raises, which inequality represents this situation?a. x>250b. x_250d. x The solstice is a time of year when the sun is farthest north or south of the equator.What type of context clue is being used to help the reader understand the meaning of the word solstice? C) Work out 3/4 5 (Give your answer as the simplest mixed fraction). Please help me, if correct get brainliest FIRST CORRECT ANSWER GETS BRAINLIEST, 43 ISNT THE ANSWER THANKS In the diagram below,Ab and De bisect each other.If f is the midpoint dc, AB=20 and De=12, find the value of FC+CB.Show how you arrived at your answer. What is the hypothesis? The higher the temperature of water, the faster an egg will cook After each winter, more pieces of rock break off the cliff. Which of these plays a major role in this process? Dissolving of mineralsActivities of animalsFreezing and thawing of iceGrass and small plants True or false1. North Carolinas heaviest population is along the Atlantic coast.2. Most of Minnesotas population lives in the central part of the state.3. Idaho is more densely populated than South Carolina.4. Large areas of low population lie between Baltimore and Boston. Which of the following provides the correct sequence in the marketing research process? 1. defining the problem, analyzing the situation, getting problem-specific data, interpreting the data, solving the problem 2. analyzing the situation, defining the problem, getting problem-specific data, interpreting the data, solving the problem 3. getting problem-specific data, interpreting the data, defining the problem, solving the problem, analyzing the situation 4. analyzing the situation, getting problem-specific data, interpreting the data, defining the problem, solving the problem 5. getting problem-specific data, interpreting the data, analyzing the situation, defining the problem, solving the problem Write an equation for the parabola with the vertex (0,0) and focus (5,0) A girl is swimming 1 meter below sea level and dives down another .5 meters. How far below sea level is she now? What is the slope of a line parallel to the line whose equation is 22 - y = 7. Fullyreduce your answer. 1. Here is a polygon. Draw a scaled copy of the polygon using a scale factor of 1/2.The scale of a map says that 8 cm represents 5 km.What distance on the map (in centimeters) represents an actual distance of 8 kilometers?Must show your math thinking on the sketchpad.You may use a calculator, but must show the calculations you used. Help ASAP!!!!!!!!!!!!!!!! (25 POINTS + BRAINLIEST)A rectangular prism has a square base with side length s units. It also has the curious property that the numerical value of the sum of its edge lengths (in units) is equal to the numerical value of its surface area (in square units).If one edge of the prism has length 8 units and s 6= 8, then s can be written in the form a + b, where a and b are integers. Find a + b. If 5x+4y=58 and 3x + 7y = 67 find the value of ( x + y ) Please give me a couple of ideas I could do to start my writing.Describe each of the FITT training principles. Daisy decides to go on a hike to a picnic area. Her map shows that when she reaches the giant oak tree she will have completed 60% of the hike. When Daisy reaches the giant oak tree she has walked 18 kilometers. How many kilometers does Daisy have left to reach the picnic area? Find the value of the expression 30 3 2 3 + 8(2).