1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maria [59]
3 years ago
11

Paragraph: Read the following two e-mail messages. In a paragraph of no less than 125 words, explain why e-mail B is the more ap

propriate workplace e-mail. Remember to consider netiquette guidelines in your response. E-mail A: DUDE! You totally shorted me on my paycheck! I seriously am upset. It is majorly less than it shold be. I totally worked overtime last pay period!!!! YOU NEED TO FIX THIS RIGHT AWAY. I am going shopping this weekend and i need my cash. E-mail B: When I got my paycheck, I noticed that it was less than I expected. It looks like I did not receive overtime pay for the extra hours I worked last pay period. Can you please review this and let me know how I can get this corrected?
Computers and Technology
1 answer:
Mashcka [7]3 years ago
3 0
(You'll have to modify my words a bit since I am not the best at English and word-choice.)

  Email A is completely out of its place. It sounds like an angry teenager wrote it. It sounds effortless and is completely unfit for a work place because of it. For example, "DUDE!" and "YOU NEED TO FIX THIS RIGHT AWAY" have unnecessary capitals, and "I totally worked overtime last pay period!!!!" has one too many exclamation points. Email B, however, is more sophisticated and is written in an orderly, calm manner. This is more suited for work due to its maturity and calmness compared to email A. The person writing email B is thoughtful and has manners, unlike the person writing email A. Email B also doesn't sound like it was at all rushed, but email A does sound like it was extremely rushed. Because he or she is probably angry or panicking, email A sounds completely unprofessional.


WORD COUNT: 139
CHARACTER COUNT: 794
You might be interested in
You use worksheets to perform calculations. How do you perform these calculations?
Elena-2011 [213]
The main function you will use is.... Type SUM= in all caps into a cell and then you can control click cells to add them together. You can also add PEMDAS properties to do calculations withing it.
5 0
4 years ago
Read 2 more answers
which type of processor chip is designed to perform a single function and is typically custom-designed?
jarptica [38.1K]

SoC is kind of processor chip that is designed  to perform a spesific function and is typically custom-designed. Hence, the answer is D.

System on chip (SoC), can be described as a design where processors, controllers, and devices reside on a spesific processor die (or chip). Packaging of SoC saves space and is usually power efficient. A system-on-a-chip (SoC) refers to a microchip with all the desire electronic circuits. Kind of processor chip that is designed to appear a spesific function and is typically custom-designed is known as SoC. SoC has responsible to againts cyber threats. SoC is important because it can immediately respons if there are incident.

The question isn't complete. The complete question is shown below:

Which type of processor chip is designed to perform a single function and is typically custom-designed?

A. ASIC  

B. FPGA

C. x86

D. SoC

Learn more about System on chip (SoC) at brainly.com/question/26528046

#SPJ4

6 0
1 year ago
Select the correct answer from each drop-down menu. Kristian is a cybersecurity professional. She is writing a book called The D
Papessa [141]

Data sharing, maintaining security

<u>Explanation:</u>

Kristian is a cybersecurity professional. She is writing a book called The Door Toward Cybersecurity. Organizations should avoid any data <u>sharing or exchange</u> while servers are transmitting information. This will help organizations keep the information intact and maintain <u>security.</u> If any info or data shared when the servers are transmitting the info, then it may lead to the loss of security, and the information gets leaked. So it must be avoided to share while transmission of info using the servers.

3 0
3 years ago
Read 2 more answers
Consider the following methods.public void modParams(int[] x, int[] y, String[] s){x[1] = 5;y = x;s[1] = new String("five");s =
skad [1K]
I am not too happy to be a good man in my world but he is made me very very much and he is made me very very much and he is very much very good to him very much and he is very much very good to you very good and very much to be able for my kids with a little more money will not go back and you can do the greatest if he can be very much and you have no problem and then we do all the way that we are not the right answer but you have a question to do and you don’t have the right right answer the answer right back and he will not be very good I am very good and he is very very bad
5 0
3 years ago
Desinated for a network connection within a largecity or multiple small citys
frozen [14]

I think it is WAN (Wide Area Network).

6 0
3 years ago
Other questions:
  • Header and footer elements such as worksheet name, current date, and time are _____ elements, they change as your worksheet does
    12·1 answer
  • With a _____ network connection, the computers and other devices on the network are physically connected via cabling to the netw
    13·1 answer
  • When you set the position property for a block element to fixed, the element
    5·1 answer
  • Using Word, Maureen is writing an outline of a presentation she plans to give to her company. She will be showing a video during
    12·2 answers
  • What are the features of Cobol language that make it suitable for programming business applications.
    6·1 answer
  • Write a class called Date that represents a date consisting of a day, month, and year. A date object should have the following m
    10·1 answer
  • What is a device driver​
    13·2 answers
  • The web design teams of a company are working on designing websites for various companies, Pick the ideas that employ proper use
    13·1 answer
  • _________ is the method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain
    6·1 answer
  • The terminology used to describe a possible path to resolution to a problem from one end to the other is called what?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!