1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tcecarenko [31]
2 years ago
7

You’re investigating an internal policy violation when you find an e-mail about a serious assault for which a police report need

s to be filed. What should you do? Write a two-page paper specifying who in your company you need to talk to first and what evidence must be turned over to the police.
Computers and Technology
1 answer:
Rasek [7]2 years ago
6 0

The email specifying who in your company you need to talk to first and what evidence must be turned over to the police is written below.

The manager,

Robotics Plc.

Dear sir,

<h3>Issue of  internal policy violation</h3>

I wish to bring to your notice an issue of concern that has occurred in the company. All employees are mandated to work for the growth of the company and when things or due protocol are not being followed, it can bring an organization down.

I wish to bring to your notice an issue of  internal policy violation  that was done by Mr. Yusuf Thomas on December 2021 that has cost the company to loss about 2million dollars. He used the companies money and also took some of the companies client for himself.

He is still working and no sanction or steps have been taken to reprimand him. I wish that the issue be solved so that others will not follow the same steps.

Thanks and waiting for quick response.

Mary Gina.

Learn more about policy violation from

brainly.com/question/13198827

#SPJ1

You might be interested in
Write an alogrithm to display the first ten even numbers​
sladkih [1.3K]

Answer:

Step1:start

step2: enter the ten number

s3: if the number is divided by 2 then print even number

s4: otherwise print odd number

s5:stop

4 0
3 years ago
What food does swiss eat on christmas?
UkoKoshka [18]
The main Christmas meal is eaten on Christmas Eve and popular foods include a Christmas ham and scalloped potatoes with melted cheese and milk baked into it. Desert is often a walnut cake and Christmas cookies.
7 0
3 years ago
During the weekend, Alice often needs to access files stored on her office desktop from her home laptop. Last week, she installe
ICE Princess25 [194]

Answer:

Depending on the error message which Alice get but what could have gone wrong is perhaps firewall issue.

Explanation:

There are lots of probable reason why Alice could not access her files during the weekend but below are some common reasons:

Firewall issue: Maybe Alice has her firewall turned on unknowingly as it is known that firewall do block such types of connection except it is explicitly allowed from the firewall settings.  Another issue might be that, Alice ISP uses firewall.

FTP programs Setting: Perhaps there is a settings which Alice has not activated in the FTP program that she is using.

3 0
4 years ago
How much space should be allotted to park your vehicle parallel to the curb?
alexandr1967 [171]

there is no definite answer. so long as you are not touching another vehicle or in the road.

6 0
3 years ago
Over the past year alone, more than _________ have been stolen from Target.
jasenka [17]
40 million (google said so)
6 0
3 years ago
Read 2 more answers
Other questions:
  • Example: An amount of $1,500.00 is deposited in a bank paying an annual interest rate of 4.3%, compounded quarterly. What is the
    5·1 answer
  • Lydia noticed that she feels tired and out of breath after walking her dog up a hill in the park. Which area of fitness does she
    8·1 answer
  • How does a linear algorithm perform compared to a quadratic one on our imaginary race track?
    5·1 answer
  • Which statement is not true? An audit objective for systems maintenance is to detect unauthorized access to application database
    8·1 answer
  • What connectors are available for components to be connected externally to the motherboard
    12·2 answers
  • Make a list of five primary raw materials, for each one, indicate and industrial material that is created from it
    10·2 answers
  • _______________ is a computer networking protocol used by hosts to retrieve IP address assignments.
    11·1 answer
  • Using C++
    13·1 answer
  • How to give a brainiest on a question? if you teach me i will give brainiest
    7·2 answers
  • Please someone do this for me and send a screenshot i really need it for my exams pleaseeee :(<br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!