Is the careless writing and sending of email messages without proper consideration of use of language, poor typing character, improper identity and lack of respect to the recipient.
GEOFFREY OKELLO answered the question on February 28, 2018 at 09:18
- What the name for the program or service that lets you view e-mail messages?(Solved)
What the name for the program or service that lets you view e-mail messages?
Date posted: February 28, 2018. Answers (1)
- With the use of internet, email has become part and parcel of communication. Briefly describe the negative impact it brings.(Solved)
With the use of internet, email has become part and parcel of communication. Briefly describe the negative impact it bring.
Date posted: February 28, 2018. Answers (1)
- The internet is making the world to be a global village with easier communication of email. Describe the advantages of using email for communication.(Solved)
The internet is making the world to be a global village with easier communication of email. Describe the advantages of using email for communication.
Date posted: February 28, 2018. Answers (1)
- State a specific example where each of the following types of computers can be used: super computer, mainframe computer, minicomputer, micro computer(Solved)
State a specific example where each of the following types of computers can be used:
Super computer
Mainframe computer
Minicomputer
Micro computer
Date posted: February 28, 2018. Answers (1)
- After a system is implemented, it is evaluated. Give 3 reasons why a system should be evaluated.(Solved)
After a system is implemented, it is evaluated. Give 3 reasons why a system should be evaluated.
Date posted: February 27, 2018. Answers (1)
- Outline the seven open systems interconnection ( OSI ) reference model Layers in their order(Solved)
Outline the seven open systems interconnection ( OSI ) reference model Layers in their order
Date posted: February 27, 2018. Answers (1)
- Explain the meaning of the terms below as used in data security and controls. (i) Information security (ii) Fraud (iii) Eavesdropping (Solved)
Explain the meaning of the terms below as used in data security and controls.
(i) Information security
(ii) Fraud
(iii) Eavesdropping
Date posted: February 27, 2018. Answers (1)
- Make a clear difference between Log file and Firewall.(Solved)
Make a clear difference between Log file and Firewall.
Date posted: February 27, 2018. Answers (1)
- Give FOUR reasons why operating systems were developed. (Solved)
Give FOUR reasons why operating systems were developed.
Date posted: February 27, 2018. Answers (1)
- State advantages of using wireless transmission media to connect to the internet.(Solved)
State advantages of using wireless transmission media to connect to the internet.
Date posted: February 27, 2018. Answers (1)
- Make a clear difference between a Website and Web portal(Solved)
Make a clear difference between a Website and Web portal
Date posted: February 27, 2018. Answers (1)
- Name two special purpose memories found either inside or outside the microprocessor. (Solved)
Name two special purpose memories found either inside or outside the microprocessor.
Date posted: February 27, 2018. Answers (1)
- Give two advantages of digital data over analog data. (Solved)
Give two advantages of digital data over analog data.
Date posted: February 27, 2018. Answers (1)
- Mention the various categories of Data Model.(Solved)
Mention the various categories of Data Model.
Date posted: February 27, 2018. Answers (1)
- What is “Snapshot” or “Database State”?(Solved)
What is “Snapshot” or “Database State”?
Date posted: February 27, 2018. Answers (1)
- Mention various types of databases. (Solved)
Mention various types of databases.
Date posted: February 27, 2018. Answers (1)
- Mention the advantages of using DBMS?(Solved)
Mention the advantages of using DBMS?
Date posted: February 27, 2018. Answers (1)
- The speed of a computer processor is measured in? (Solved)
The speed of a computer processor is measured in?
Date posted: February 25, 2018. Answers (1)
- Giving reasons identify four situations where communication over wireless medium for instance radio and mobile phones may be preferable to guided information over cable(Solved)
Giving reasons identify four situations where communication over wireless medium for instance radio and mobile phones may be preferable to guided information over cable.
Date posted: February 25, 2018. Answers (1)
- When Microprocessor was invented?(Solved)
When Microprocessor was invented?
Date posted: February 24, 2018. Answers (1)