1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leno4ka [110]
3 years ago
9

A polite way to ask your boss for the training manual

Business
2 answers:
galben [10]3 years ago
7 0
Yo homie Quan gimme the manual
MAXImum [283]3 years ago
3 0
May I please see the training manual.
You might be interested in
Iam a 4 tail fox im a chef and a medic what am i
rewona [7]

Answer:

Explanation:Surgeon

3 0
3 years ago
Read 2 more answers
Companies in the "sunset" industries develop environment ally sound substitutes
OverLord2011 [107]
What's your question I don't understand
6 0
3 years ago
The price of a complementary good changes. __________ Demand shifts Movement along demand Incomes in the economy​ change; the go
ad-work [718]

NOTE: Your question isn't clear, Johnson. Would you mind checking it and writing it in a way you can be better helped?

Meanwhile, I hope these explanation below helps.

Answer and Explanation:

Two goods are said to be complementary goods if an increase in the price of a particular one leads to a commensurate decrease in the demand that buyers placed for the other one.

A good is said to be a normal good if the reason for an increase in demand is due to an increase in the income of the buyers.

A good is said to be an inferior good if there is a decrease in demand even though the buyers have experienced increase in their income.

4 0
3 years ago
Connie opened a link that she received in an email. It led to a webpage that congratulated her on winning $1 million. The webpag
Mariana [72]

Answer:

This kind of malware attack is known as ransomware.

Explanation:

-Ransomware is a type of malicious software that typically involves encrypting the files of a victim's PC, laptop or systems. The hacker(s) This essentially denies the victim any access to their data.They then demands payment in order to allow the victim access to their own data. The payment is always required to be transferred in crypto-currency to the hackers.

-Examples of ransomware includes Reveton, CryptoLocker, CryptoWall and the infamous Wannacry which attacked many victims PC across the globe in 2017. Ransomware attacks can be initiated by a user unknowingly visits an infected website.The malware then self downloads and installs itself onto the user’s PC without their knowledge.

-Ransomware attacks can be prevented by using advanced antivirus.

7 0
3 years ago
Vertical space can be utilized to gain more storage space?<br> True or False
alexandr402 [8]
<span>True. Vertical space can be used for more storage space, however in most storage units only fifty percent of the total storage is not utilized. Using vertical space will increase the storage space</span>
6 0
3 years ago
Read 2 more answers
Other questions:
  •  A sick relative has decided to create a living will. Based on your knowledge of living wills, what type of information do you t
    11·1 answer
  • When should you begin preparing for an interview?
    10·1 answer
  • Many ironworkers are also experienced in what other skills? (Select all that apply.)
    8·1 answer
  • FunZone Inc. identified and developed a SmartCard that can be used at fair grounds to make the ticketing process easier. The com
    13·1 answer
  • Partner Beth has a basis of $10,000 in a partnership at the beginning of the year. She receives $6,000 in cash distributions, he
    7·1 answer
  • Live Trap Corporation received the data below for its rodent cage production unit. OUTPUT INPUT 49,200 cages Production time 630
    10·1 answer
  • Why do lower labor costs in other countries lead to job loss in the United
    7·1 answer
  • Hero Manufacturing has 5 million shares of common stock outstanding. The current share price is $84 and the book value per share
    13·1 answer
  • The scandal at luckin coffee is being portrayed by the company as perpetrated by ________, whereas some analysts suspect it is m
    11·1 answer
  • Is/are also called factors of production since they are transformed into output during the production process?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!