1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tcecarenko [31]
2 years ago
7

You’re investigating an internal policy violation when you find an e-mail about a serious assault for which a police report need

s to be filed. What should you do? Write a two-page paper specifying who in your company you need to talk to first and what evidence must be turned over to the police.
Computers and Technology
1 answer:
Rasek [7]2 years ago
6 0

The email specifying who in your company you need to talk to first and what evidence must be turned over to the police is written below.

The manager,

Robotics Plc.

Dear sir,

<h3>Issue of  internal policy violation</h3>

I wish to bring to your notice an issue of concern that has occurred in the company. All employees are mandated to work for the growth of the company and when things or due protocol are not being followed, it can bring an organization down.

I wish to bring to your notice an issue of  internal policy violation  that was done by Mr. Yusuf Thomas on December 2021 that has cost the company to loss about 2million dollars. He used the companies money and also took some of the companies client for himself.

He is still working and no sanction or steps have been taken to reprimand him. I wish that the issue be solved so that others will not follow the same steps.

Thanks and waiting for quick response.

Mary Gina.

Learn more about policy violation from

brainly.com/question/13198827

#SPJ1

You might be interested in
Lindsey also needs to calculate the commissions earned each month. If the company earns $200,000 or more in a month, the commiss
lutik1710 [3]

Answer:

I have created and attached an image with example values for this question.

First we'll learn the IF function syntax:

IF(logical_test, value_if_true, [value_if_false])

Where

logical_test is the decision making comparison

value_if_true is the result to return when TRUE

value_if_false is the result to return when FALSE

We assume that cells B10 to G10 contain the Total Sales for January to June. And cells B17 to G17 contain the Commissions for January to June.

a.

The formula to use in cell B17 is:

<em>=IF(B10>=200000;True;False)</em>

<em />

b.

The formula to use in cell B17 is:

<em>=IF(B10>=200000;B10*0.35;False)</em>

<em />

c.

The formula to use in cell B17 is:

<em>=IF(B10>=200000;B10*0.35;B10*0.27)</em>

<em />

d.

To copy the formula in B17 to C17:G17, you can just copy and paste or select cell B17 and drag from the black square on the bottom right of the cell.

8 0
3 years ago
Read 2 more answers
What is one effective way for employees to keep their skill-sets current
natta225 [31]
Is it a multiple choice answer? if so would like to see the answers as there are TONS of effective ways and if i list one it may not be in that list you have if its multiple choice.
3 0
3 years ago
You have had a problem with duplicate medical record numbers in your health care facility's MPI. Now you are joining a health in
Sindrei [870]

Answer:body??

Explanation:i dont know

8 0
4 years ago
Making __________ cache a part of the processor caused manufacturers to move from sockets to slots in the late 1990s
iren2701 [21]

Answer:

The description of the discussion has been illustrated throughout the explanation segment elsewhere here.

Explanation:

  • Processors started to incorporate constructed L2 cache, acquired as completely separate chips from multiple vendors of Static Random access memory chip.
  • This same processor and after that usually consists not of even single, and therefore of many other processors, that everything positioned upon its motherboard, which would then be inserted into another motherboard socket.

4 0
3 years ago
What protocol does a web browser normally use? at which osi layer does this protocol work?
Nookie1986 [14]
The answer is HTTP and it works over the application layer. The hypertext transfer protocol or as called as HTTP is an application protocol for distributed, collaborative and hypermedia information systems in which this is the foundation of the data communication for the world wide web or as called as www. 
6 0
3 years ago
Other questions:
  • How do you train a computer to recognize your voice?
    14·2 answers
  • What are the advantages of technology ​
    14·1 answer
  • What is built on integrated circuits and carries the electrical current? CPUs Data Software Transistors
    5·1 answer
  • Suppose you will invest $100 per month at the beginning of the month for 40 years with interest rate
    5·1 answer
  • Create a new program called Time.java. From now on, we won’t remind you to start with a small, working program, but you should.
    13·1 answer
  • 18. When you turn off the power to a computer and unplug it at night, it loses the date, and you must reenter it each morning. W
    7·2 answers
  • You are setting up a RAID system in a server designed for optimum fault tolerance, accuracy, and minimal downtime. Which HDD is
    7·1 answer
  • What are the similarities between data mining and data analytics
    11·1 answer
  • Which of the following is step 5 of the mail merge process?
    5·2 answers
  • Which of the following are used to classify plutons
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!