which principle is most violated in section 5 of the email?

Answers

Answer 1

Note that the five principles of effective email writing that were violated in the email reference are given as follows:

No empathy -  The email lacks a sincere and empathetic tone toward the customer's situation.No clear solution - The email doesn't provide a clear solution to the customer's complaint.Blaming the customer - The email implies that the customer is at fault for the damage to the product.Lack of professionalism - The language used in the email is informal and lacks professionalism.No personalization - The email is not personalized and comes across as a generic response.

What is the best way to have responded?

Dear [Customer Name],

We are sorry to hear about the damage to your product. Our team has conducted an investigation and we understand that it could have occurred during transportation. To make it right, we would like to offer you a replacement product at no cost to you.

Additionally, as a token of appreciation for your loyalty, we have included a 10% discount coupon for your next purchase of $100 or more.

If you have any further questions or concerns, please do not hesitate to reach out. We value you as a customer and are committed to providing you with the best possible experience.

Best regards,

Roberto Jimenez

Customer Service Representative

Learn more about Email Writing:
https://brainly.com/question/26555351
#SPJ1

Full Question:

1) Identify five principles violated in this email.
2) Re-write the email following the principles of writing an effective email

Which Principle Is Most Violated In Section 5 Of The Email?

Related Questions

Which AWS service can you use to install a third-party database?1. Amazon RDS2. Amazon DynamoDB3. Amazon EC24. Amazon

Answers

A serverless, fully managed, key-value No SQL database called Dynamo DB is made to support high-performance software at any size.

In-memory cache, automated multi-Region replication, continuous backups, built-in security, and data import and export capabilities are all provided by Dynamo DB. You can utilize the features of a well-known My SQL, Maria DB, Oracle, SQL Server, or Postgre SQL database with RDS. This indicates that Amazon RDS should function seamlessly with the code, apps, and tools you now use with your existing databases. Relational databases are the intended use for RDS. Dynamo DB, on the other hand, is meant to be used with non-relational databases. Although RDS costs more than Dynamo DB, it has more capabilities and flexibility.

Learn more about software here-

https://brainly.com/question/18950462

#SPJ4

how can we tell if the system is easy to use

Answers

Usability The system should be simple to understand, utilise, and remember how to use. Every time a user needs to the system, they shouldn't have to go to the .

A computer system is made up of a computer plus other hardware and software. A central processing unit (CPU), memory, input/output devices, and storage devices make up the majority of a computer system. The combined operation of all these parts produces the desired result. Good: Normal and tear - the laptop is in perfect working order and has no obvious defects. There are no structural or faults, however the laptop's cover, mouse pad, , and other exterior elements may exhibit some wear, scratches, and markings. The product is in decent used shape and is completely functional.

To learn more about system click the link below:

brainly.com/question/19368267

#SPJ4

When should you specifically update RED/DA information in your electronic service record?

Answers

We should use as soon as status information changes when specifically update RED/DA information in your electronic service record.

What would be information, and what are some uses for it?

Since knowledge helps with decision-making, it is a compilation of data that has been organized for human consumption. A few examples are schedules, honor rolls, test scores, headed tables, and generalize results from a larger (pay stubs, vouchers, reports, etc.).

How are information and knowledge different?

Knowledge is understanding, awareness, or a skill that you acquire via experience or study. Information is particular or factual information about a subject. Information is the extent of our know, whereas expertise is your level of understanding.

To know more about Information visit:

https://brainly.com/question/28498043

#SPJ4

which password attack is typically used specifically against password files that contain cryptographic hashes?

Answers

Cryptographic hashes stored in password files The multihop procedure employed by many different types of networks is utilized to advantage in man-in-the-middle attacks.

What kind of attack is most frequently applied exclusively to password files that contain cryptographic hashes?

However, only the birthday attack expressly targets the cryptographic hashes kept in a system's password file. All of the other attack techniques listed may be used against passwords.

Which password attack is most common?

Brute force, dictionary attacks, password scattering, and credential stuffing are some of the most popular attack techniques. Using all possible combinations of the set of permitted characters in an effort to guess a password is known as brute forcing.

To know more about Cryptographic hashes visit :-

https://brainly.com/question/8818471

#SPJ4

Which is an essential feature of a while loop having the following form?while(LoopExpression){loopBody}

Answers

Explanation:

The essential feature of a while loop having the following form: 'while(LoopExpression){loopBody}' is the loop expression.

The loop expression is evaluated before each iteration of the loop. If the loop expression evaluates to 'True', the loop body is executed and the loop continues. If the loop expression evaluates to 'False', the loop terminates and the program continues with the next statement after the loop.

Thus, the loop expression acts as a condition that controls the execution of the loop body. This allows the loop to repeat until some specified condition is met.

indirect interaction requires that the end user knows how to issue commands to the specific dbms. true false

Answers

The end user must be familiar with the specific DBMS in order to engage in indirect contact. false for the answer.

For what purpose a DBMS is software used?The end user must be familiar with the specific DBMS in order to engage in indirect interaction. Another name for requirements visualisation is conceptual data modelling. The requirements can be added implicitly and iteratively over a competent requirements collection process.Software programmes called database management systems (DBMS) are used to store, retrieve, and query data. Users can add, read, edit, and delete data from databases using a database management system (DBMS), which acts as an interface between an end-user and the database.Direct Interaction occurs when the end user speaks with the DBMS directly. A front end application is used when there is an indirect interface between the end user and the database. Direct communication necessitates a higher level of skill and knowledge from the end user.

To learn more about DBMS refer to:

https://brainly.com/question/24027204

#SPJ4

compare the system file checker tool to the file signature verification tool (sigverif). what are the benefits of having both of these tools available within powershell?

Answers

The system file checker tool and file signature verification tool, both check the problems with files on your computer.

What is a system file checker tool?

Users can search for and repair damaged Windows system files using the System File Checker tool in Microsoft Windows.

In order to validate all files on the storage medium and find any hidden ones, a signature analysis compares file headers and extensions with a database of known file headers and extensions.

Therefore, both the system file checker and the file signature verification utility scan your computer's files for issues.

To learn more about the file checker tool, refer to the link:

https://brainly.com/question/30256329

#SPJ1

Popularity of cloud databases has more than doubled in the past decade. which cloud service model is driving this?
a. Software-as-a-Service (SaaS)
b. Commercial databases
c. Infrastructure as a Service (IaaS)
d. Platform as a Service (PaaS)

Answers

The most significant driver of the increased popularity of cloud databases is Software-as-a-Service (SaaS). This cloud service model provides users with access to databases and other software applications, which can be used to store and manage data in the cloud. This has made cloud databases much more accessible and convenient for users.

The increased popularity of cloud databases in the past decade can be attributed to the Software-as-a-Service (SaaS) cloud service model. This model provides users with access to databases and other software applications in the cloud, making cloud databases much more accessible and convenient. With SaaS, users do not have to manage the hardware or software needed to run databases, nor do they have to worry about purchasing licenses or making upgrades. This makes it simple for users to store and manage their data in the cloud without having to invest in and maintain their own physical infrastructure. Furthermore, since SaaS is a pay-as-you-go model, users only have to pay for the services they use, making it more cost-effective than traditional database solutions. All of these factors have contributed to the increased popularity of cloud databases in the past decade.

Learn more about software here-

brainly.com/question/29946531

#SPJ4

if you want to see your slide presentation organized into a blueprint of itself, which view would you choose?

Answers

The Slide Sorter View is the second view. This view gives a simple way to rearrange or remove one or more slides while also providing a smaller version of your presentations.

What is a presentation's blueprint?

An first plan for your upcoming presentation is a presentation outline. It enables you to determine which points to emphasize and what structure to use. A strategy makes it more simpler and more time and money efficient to create a presentation outline.

When you save a slide or set of slides as a.pots file, you are creating a PowerPoint template. Layouts, colors, fonts, effects, background styles, and even content can all be found in templates. You can make your own unique templates, save them, and use them again and again.

Developing Presentation Content According To A Blueprint

Start with the basics.Determine the Supporting PillarsTalk about the purpose.Talk about the history.Your Presentation's OutlineDiscard The Data.Then Add your visual accents to your presentation.

To learn more about Blueprint of Presentation refers to;

brainly.com/question/28924938

#SPJ4

When you open a template from the new tab in the Backstage view it opens as a?

Answers

A new instance of template launches as a workbook when you select one from the Template folder in Backstage view. Only the machine on which they were produced may utilize a template.

What does a Powerpoint backstage view mean?

You have a number of choices for storing, viewing, printing, or sharing your slideshows while using the backstage view. On the Ribbon, select the File tab to open Backstage view.

What significance does the backstage perspective have?

You can interact with datasets and application-level settings thanks to it. In the other respects, the Backstage view gives you access to the database itself, but the instructions on the other Ribbon tabs give you access to the database itself.

To know more about Backstage view visit :

https://brainly.com/question/19752912

#SPJ4

if you represent from as ieee double precision floating point numbers using round-to-nearest and compute in that representation, what can you say about the computed result compared to the exact result obtained without rounding?

Answers

When millions of calculations are taken into account for double-precision floating point numbers, the computed result will only change; otherwise, for routine calculations, the difference is only 0.1, which is easily negligible.

Even though it sacrifices precision, a floating point is utilized to express fractional numbers or when a larger range is required than a fixed point (of the same bit width). When the range or precision of single precision is insufficient, double precision may be utilized.

An approximation representation is necessary to fit an infinite number of real numbers into a finite number of bits. Although there are an endless number of integers, most programs can store the outcome of integer computations in 32 bits. In contrast, the majority of real-number operations will result in amounts that cannot be precisely represented with that many bits.

Therefore, in order to fit the output of a floating-point calculation back into its finite representation, rounds are frequently required. The defining characteristic of floating-point calculation is this rounding error.

To learn more about floating point click here:

brainly.com/question/30365916

#SPJ4

. how does the badger illustrate the worldly pursuits of human beings in ch.4? in win in the willows

Answers

In "The Wind in the Willows," Badger in Chapter 4 symbolizes a departure from materialistic goals and a reminder to focus on personal values and priorities.

In Chapter 4 of "The Wind in the Willows," the Badger is described as a creature who is content with his simple and solitary life in the Wild Wood. He does not have any interest in the outside world, and is immune to the temptations and distractions that come with it. Instead, he focuses on his own personal pursuits and interests, and spends his days in quiet contemplation and peace. Through his character, the author is able to illustrate the dangers of becoming overly focused on worldly pursuits and the importance of staying true to one's own values and priorities. The Badger's peaceful and contented life serves as a contrast to the hectic and often unfulfilling lives of those who are caught up in the pursuit of wealth, power, and fame.

Learn more about priorities here:

https://brainly.com/question/18046241

#SPJ4

in apa documentation, how should the following parenthetical reference appear? group of answer choices (waters, 2015) (waters, p. 24, 2015) (waters 24) (waters, p. 24)

Answers

The author's name and publication date or comparable information are enclosed in parentheses in parenthetical citations.

A statement may begin with or end with a parenthetical reference. This data is included in narrative citations as a sentence-level component of the text. The phrase Parts of the human body mirror the principles of tensegrity is an example of a parenthetical citation, which places all pertinent source information in parentheses at the end of the sentence or clause. For a parenthetical reference, the author's name and the date are both enclosed in parenthesis and separated by a comma. Put the period or other end punctuation after the closing parenthesis if the citation comes at the conclusion of the sentence.

Learn more about data here-

https://brainly.com/question/17355880

#SPJ4

after filtering a column and getting the results, in which two ways can you return to showing all the data in a column

Answers

Excel has three different filtering options: by values, by a format, and by criteria. However, these several filter types are mutually exclusive.

For instance, you cannot filter by both a list of numbers and the color of the cells. You cannot filter by both an icon and a custom filter at the same time. You can either reapply a filter or sort operation to acquire the most recent results after filtering or sorting data in a set of cells or a table column, or you can clear a filter to display all the data again. Multiple variables may be obtained with the filter var array() function, which also filters them if desired. Without executing filter var, the function is handy for filtering numerous values ().

Learn more about array here-

https://brainly.com/question/13261246

#SPJ4

which server must be started before running datasocket vis?

Answers

Before launching the DataSocket Vis client, which enables real-time data viewing, the DataSocket Vis server must be started.

A client-server program called DataSocket Vis is used to access and display real-time data. Before launching the DataSocket Vis client, which enables real-time data viewing, the DataSocket Vis server must be started. The communication between clients and the data source is handled by the server. It serves as a go-between between clients and the data source, offering a safe link to the information. The client cannot access the data until the server is up and operating. Which data sources are accessible to the client must also be defined on the server. The client can connect to the server and access the data once it is operational. Additionally, the client can be set up to choose which data sources to display.

Learn more about server here:

brainly.com/question/28384347

#SPJ4

how many pairs are used by a typical single line analog telephone?

Answers

A typical single-line analog telephone typically uses two pairs of wires for its connection.

The first pair of wires is used for sending audio signals from the telephone to the central office or exchange, and the second pair is used for receiving audio signals from the central office or exchange. The two pairs of wires are typically twisted together to form a 4-wire cable, with each wire in the cable serving a specific purpose in transmitting and receiving audio signals. The use of two pairs of wires in a single-line analog telephone connection allows for full-duplex communication, meaning that both parties can talk and listen at the same time.

The two pairs of wires in a single-line analog telephone connection are usually twisted together to form a 4-wire cable. This twisting helps to reduce crosstalk and electromagnetic interference between the wires, allowing for a clearer audio signal to be transmitted. The two pairs of wires are also usually color-coded, with one pair being green and red and the other pair being black and yellow. The green and red wires are used for the send signals, while the black and yellow wires are used for the receive signals.

Learn more about full-duplex communication here:

https://brainly.com/question/29998337

#SPJ4

help due tonight, danger of failing

Answers

Answer:

1.) correct

2.) This is a valid assignment statement as both "age" and "100" are integers, and the addition operator returns an integer value which can be assigned to the int variable "iQ".

3.) Invalid. iQ is an int variable, and 120.5 is a double. Assigning a double value to an int variable will result in the decimal portion being truncated.

4.) This is an invalid assignment statement because it is trying to assign a value to an expression instead of a variable. The correct form would be "iQ = age + 150;".

5.) This is an invalid assignment statement because the variable age is of type int and it is being assigned a double value (30.2). This will result in a type mismatch and the code will not compile.

6.) This is a valid assignment statement. The variable "income" is a double and you are assigning it the value of 22000 which is a valid number for a double.

7.) This is a valid assignment statement as it is a mathematical expression that uses the variables age and iQ, which have been previously declared, and assigns the result to the variable income, which has also been previously declared.

8.) The statement "age = iQ / 3;" is a valid assignment statement. It assigns the result of iQ divided by 3 to the variable age. However, it should be taken into account that if iQ and 3 are both integers, the division will be performed as integer division, and the result will be truncated to the next lower integer, if the division is not exact.

9.) This is a valid assignment statement. The variable "iQ" is being assigned the result of the expression "3 * age", which is the value of "age" multiplied by 3. The assignment operator (=) is used correctly and all variables used in the expression are declared and initialized.

10.) This is a valid assignment statement. The value of the variable "income" is increased by 2000.


P.S. I'll complete the rest when I have the time.

which of the following is not related to mapping a virtual/logical address to a physical address in hardware? a. memory management unit (mmu) b. process control blocks (pcb) c. translation lookaside buffer (tlb) d. associative memory

Answers

The following option that not related to mapping a virtual/logical address to a physical address in hardware is  b. process control blocks (pcb). Ot is because a process control block is a software.

In computer and technology, A process control block or also known as PCB generally can be defined as a data structure used by computer operating systems to store all the information about a process. A process control block or also known as PCB  also known as a process descriptor. The operating system creates a corresponding process control block, When a process is created (initialized or installed).Process control block specifies the process state i.e. new, ready, running, waiting or terminated.

Here you can learn more about Process control block https://brainly.com/question/28561936

#SPJ4

a processor takes 20 seconds to execute a program and its clock rate is 3.6ghz if its cpi is 4 how many instructions are executed

Answers

The number of instructions executed is 18 * 10⁹. A higher CPI value indicates that a processor is taking longer to execute each instruction, which can result in lower performance.

CPI stands for Cycles Per Instruction. It is a performance metric used to measure the average number of clock cycles required to execute a single instruction in a computer processor. It is used to estimate the performance of a processor and to evaluate the efficiency of the computer's architecture and the compiled code.

To calculate the number of instructions executed, we need to determine the number of cycles the processor takes to execute the program. To do this, we can use the formula:

Cycles = (clock rate * execution time) / (cycles per instruction)

Where clock rate is in Hz, execution time is in seconds, and cycles per instruction (CPI) is a measure of the average number of clock cycles per instruction.

Given that the clock rate is 3.6 GHz, the execution time is 20 seconds, and the CPI is 4:

cycles = (3.6 * 10⁹ * 20) / 4

cycles = 18 * 10⁹

Learn more about CPI: https://brainly.com/question/14453270

#SPJ4

What is a main problem with software reuse?

Answers

One of the main problems with software reuse is the difficulty in ensuring compatibility and interoperability between different software components.

When software components are reused in a new system, they must be integrated with other components and work seamlessly together to deliver the desired functionality. However, this is not always the case as different software components may have been designed and developed with different specifications, standards, and architecture.

In addition, software components that were designed for a specific purpose may not be suitable for reuse in a different context. For example, a software component that was developed for a particular operating system may not be compatible with another operating system.

Moreover, reuse of software components can lead to maintenance and support issues. If the original developers of the software components are no longer available, it may be difficult to modify or update the software to meet changing requirements.

Finally, software reuse can also lead to security vulnerabilities. If a software component contains security vulnerabilities, these vulnerabilities can be easily exploited when the component is reused in different systems.

Overall, software reuse can be challenging because of the complexity of integrating different components, ensuring compatibility and interoperability, maintaining and supporting the components, and avoiding security vulnerabilities.

Learn more about software  here:

https://brainly.com/question/2919814

#SPJ4

what is message congruity

Answers

Message Consistency How well a message fits with the surrounding information and is internally consistent.

Figure. An object that is meant to draw attention; the main point of any message. Congruity of the message relates to how the message fits with the other information surrounding it and is internally consistent. d. Figure and ground refer to the message's main focus and setting. the theory of self-congruity and related studies. Consumers evaluate their perception of a brand image—more precisely, brand personality or brand-user image—with their own self-concept to determine whether the two are psychologically consistent (e.g. actual self, ideal self, social self).

Learn more about information here-

https://brainly.com/question/14583494

#SPJ4

part 1 1. convert 1001011 from binary to decimal. 2. convert 1101110 from decimal to binary. using arrays write functions to convert values from binary to decimal and decimal to binary.

Answers

First, we must add the first digit of the binary number and multiply 0 by 2. Step 2: Add the second binary digit to the result of the previous step after multiplying it by two.

Once there is no digit remaining, process 2 is repeated once more. The resultant decimal number will be the outcome. Accordingly, 0000 is 1, 0001 is 2, 0010 is 3, etc., till 1001 is 9, but from 1010 to 1111 of binary, the hexadecimal employs letters from A to F, and when it reaches the value of 16, it turns into 10 since the two groups of four binary digits are 0001 0000.

Learn more about digit

https://brainly.com/question/26856218

#SPJ4

a town with 1800 homes was surveyed. of the 360 who answered the survey, 48 did not have computers at home. On the basis of the survey, estimate how many total homes do not have computers at home.


URGENT!!!!

Answers

Answer:

48

Explanation:

48 is the correct answer of that question

you receive a ticket in which a user's monitor is not working. how would you solve this problem?

Answers

The very first step to resolve the problem of a user's monitor not working is to check the power cord, then check the brightness issue, and next by connecting it to the second monitor or checking the video card in the monitor.

If your monitor is a flat panel LCD, unhook the power cable, wait about 30 seconds, plug it back in, and then turn the monitor on. The monitor's electronics are reset as a result. Get a backup monitor cable in case the one you have is defective if the monitor has a detachable video wire.

Checking the power cord should be your first step when dealing with the monitor. As it turns out, turning on the monitor can be trickier than you might think. Some displays require pressing multiple buttons in order to turn them on.

The brightness setting can resemble monitor issues as well. Sometimes all you need to do is increase the monitor's brightness once more. Before getting too involved, it's good to check to see whether the brightness wasn't accidentally reduced.

Try connecting the computer to a different monitor that you know has previously worked if you have access to one. You can rule out other factors, such as the computer providing the monitor with the wrong information, if the second monitor functions.

To learn more about  video card click here:

brainly.com/question/30434355

#SPJ4

Which of the descriptions below do NOT apply to Cellular layouts?
A - Grouped in a cell by similar work
B - Organized by Part Families
C - Useful in Repetitive processes
D - Help streamline inefficient Functional layouts

Answers

The aforementioned assertion claims that they are useful in repetitive operations but NOT for cellular architectures.

What does "stretch process" mean?

The activity of identifying and removing repetitive and pointless steps or activities from a process so as to improve its effectiveness and efficiency is known as streamlining processes. Process streamlining aims to decrease waste, boost production, and enhance efficiency.

What does business streamlining entail?

By definition, streamlining is the process of making changes to something in order to make it clearer or more effective. For instance, by making sure the processes in the operation are uniform and repeatable, irrespective of who is producing and disseminating bills, you can speed the work of billing clients.

To know more about Streamline visit:

https://brainly.com/question/28612348

#SPJ4

which excel ribbon contains the charts menu?

Answers

In the excel the Insert ribbon contain the charts menu.

Excel is a spreadsheet program from Microsoft and a component of its Office product group for business applications.

Insert tab present on the ribbon contains the charts menu .

To insert the chart we first select the insert tab ,the insert ribbon open contains the charts menu chart menu contains different types of charts which are used to represent data in graphical format.

When you insert a chart into Word or PowerPoint, an Excel worksheet opens that contains a table of sample data.

A Graph in Excel is a design tool that helps us visualize data. Excel has a variety of graphs and charts that can be used to represent data in different ways.

Learn about charts here:-

https://brainly.com/question/15507084

#SPJ4

which of the following statements is true? a. the function that provides the time at the end of a simulation run is called endruntime. b. there is no function that provides the time at the end of a simulation run. c. timenow is a function in simio that represents the current system time (e.g. time on your computer taskbar). d. timenow provides the current time in the simulation run and at the end of a simulation it returns the time at the end of the run.

Answers

The correct statement is c. timenow is a function in Simio that represents the current system time (e.g. time on your computer taskbar). It does not provide the time at the end of a simulation run.

The function that provides the time at the end of a simulation run is called end time.

Endtime is particularly useful for scenarios where multiple simulations will be run, as it allows for a comparison of the time taken for each. Additionally, endtime can be used to track and analyze the performance of various processes or operations during a simulation run.

Learn more about current time functions:

https://brainly.com/question/29564405

#SPJ4

The true statement among the following options is: timenow provides the current time in the simulation run and at the end of a simulation it returns the time at the end of the run.

Simio is simulation software that can be used to model and optimize a wide range of systems. Simio can be used to create highly accurate models of dynamic systems, which can then be used to analyze and optimize the performance of the system.

Simio can be used to model both continuous and discrete systems, and can be used to model complex systems with multiple interacting components.

Simio is an object-based modeling tool that allows you to create models by building a collection of interconnected objects. These objects can represent any aspect of the system being modeled, such as machines, people, trucks, or any other component of the system.

Once a model has been created, it can be run to simulate the behavior of the system over time. During the simulation run, various statistics can be collected and analyzed to better understand how the system is performing.

Therefore, the function "timenow" provides the current time during a simulation and returns the time at the end of the simulation run.

To know more about Simio click here:

https://brainly.com/question/30882148

#SPJ11

What should be an expected reason why a portable radio suddenly fails to operate normally while on the scene of an​ emergency?
A. Repeater failure
B. Dead battery
C. Cracked antennae
D. Clogged mic

Answers

B. Dead battery. A portable radio suddenly fails to operate normally while on the scene of an​ emergency because of a dead battery.

What is the main justification for recording emergency services communications?

The main goal of EMS documentation is to offer a written account of patient evaluation and care that can serve as a reference point for additional care. All healthcare professionals participating in patient care must be able to understand the information's organization in order for it to be effectively communicated.

Why would having a clear communication channel be crucial in an emergency?

Emergency messages that are thoughtfully planned and well presented can serve to ensure public safety, safeguard property, facilitate response activities, elicit cooperation, establish public trust, and aid in the reunion of families.

What causes emergency response failures the most frequently?

Lack of the proper amount of leadership support is one of the most frequent causes of emergency management attempts failing.

To know more about dead battery visit:

https://brainly.com/question/9202225

#SPJ4

The statement reads, "While on scene of an emergency, that dead battery of the radio suddenly ceases to work normally."The correct option is B.

What is radio, briefly?

Radio is a form of sound transmission through radio waves that often involves the distribution of music, journalism, and other programming from a single broadcast station to a large audience of listeners with radio receivers.

What is another name for radio?

Another name for: wireless. an electrical device intended for receiving, demodulating, and amplification of radio waves from sound television broadcasts and other sources. 3. a comparable gadget that enables two-way radio communication by allowing radio signals to be sent and received.

To know more about Radio visit :

https://brainly.com/question/21439267

#SPJ4

Which two fields are included in the TCP header but not in the UDP header? (Choose two.)
window
checksum
source port
destination port
sequence number

Answers

Due to the fact that UDP doesn't offer any of the services that these fields are needed for, the fields sequence number, acknowledgment number, and windows size are not present in a UDP header.

The sequence number, acknowledgment number, and Window fields are the only ones in the UDP header that are absent in the TCP header. Compared to the TCP header, the UDP header is significantly smaller (8 bytes) (20 bytes). The source and destination Port fields are 16 bit entries in both the UDP and TCP headers. In order to respond to the message, use the source port field. Here is a useful diagram showing both headers.

Learn more about windows here-

https://brainly.com/question/28525121

#SPJ4

what do you normally use with a partially-filled array in order to know the number of actual items in it?

Answers

The usual method for creating partially filled arrays is to use a global variable that specifies the largest possible array size.

What is an array?

Usually, an integer variable holding the number of elements properly stored in the array is used conjunction with such a partially filled array.

An array is a grouping of related data elements that are kept in nearby memory regions. Since each data element could be readily retrieved using only its index number, it was a very simple data structure.

For instance, we do not need to construct unique variables for each subject if we wish to store certain students' grades across, say, five subjects. Instead, you can specify an array in which each data element is kept at a separate location in the memory.

Each topic's scores are located in a distinct location in the array, i.e., marks[0] signifies the scores scored in the first subject, marks[1] denotes the scores scored in the second subject, and so on. The array of marks[5] represents the student's scores in all 5 different topics.

To learn more about Array refers to;

brainly.com/question/29557110

#SPJ4

Other Questions
evaluate the iterated integral. 1 0 x x2 (5 10y) dy dx what type of relationship (direct or inverse) exists between wavelength, frequency, and photon energy? what does a photon energy unit of a joule equal? what is the range of the input voltages that will be coded as: (0011 1011 1011 0001)2. See Maths Questions attached Six different colored dice are rolled. Of interest is the number of dice that show a one.Find the probability that all six dice show a one. suppose you withdraw $ from your checking account and use the funds to a at the bank. how will these actions affect m1 and m2? according to madison, what is the solution to the problem of compelling the states to obey federal law? Which XXX calculates and prints the total cost? #include #include typedef struct Item_struct {double price; char name: int quantity; double total; } Item; typedef struct Total_struct { double totalCost; } Total; int main(void) { Item booki: Item book2; Total cost; book1. total - booki.pricebooki.quantity: book2. total book2.price* book2. quantity: XXX } cost.totalCost = booki.total + book2. total; printf("Total: %f dollars\n", cost. total Cost); totalCost booki.total + book2. total; printf("Total: %f dollars\n", cost. totalCost); cost. total book1. total + book2. total; printf("Total: %f dollars\n", cost.totalCost); O cost.totalCost = book1. totalCost + book2. totalCost; printf("Total: %f dollars\n", cost.totalCost); 45% of c is 72. Find the value of c which of the following is an example of directional selection? question 34 options: a) a mouse population that is originally white in color becoming darker in color after several generations b) a flower population that originally ranges from white to red becoming mostly pink over several generations c) a moth population that is originally grey gradually dividing into discrete white and black populations over several generations URGENT! NEED ANSWER NOW! WILL MARK BRAINLIEST!!!Some ducks and sheep are grazing in a lakeside meadow. All together, the animals have 15 heads and 38 legs. How many ducks are there? What is the main theme of Act 1 in Macbeth? When a regulatory authority finds a critical violation what should the person in charge do first? how did world war is committee on public information (cpi) inspire business in the 1920s? the sum of the measures of the interior angles of a convex polygon is given. classify the polygon by the number of sides in both examples i need the equation simplified What r good laptop to use for uni/school that last 7 hours up On January 2 of the current year, Otto Co. purchased 40% of Penn Co.'s outstanding common stock.The carrying amount of Penn's depreciable assets was $1,000,000 on January 2.Penn's depreciable assets had an original useful life of 10 years and a remaining useful life of 5 years. Otto recognized $8,000 amortization for the current year ending December 31 related to its investment in Penn due to the excess of fair value over book value on these assets.What was the fair value of Penn's depreciable assets on January 2 of the current year? Which of the following theory is not considered one of the three mainstream theories of criminology?1) Differential association theory2) Anomie-strain theory3) Labeling theory4) Control theory why is it important to collect class data