1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRINA_888 [86]
3 years ago
14

You are the manager and an employee shows up for his shift dressed inappropriately for work. What should you do?

Computers and Technology
2 answers:
yarga [219]3 years ago
7 0

Most managers see inappropriate dressing every day. Some are left angered while some are confused as to what is the right way to approach such situations. What follows next needs to be professional oriented. Being the manager, I would start by finding out what the appropriate dressing policies are. Some companies might have dress code policies while others might not. Assuming that this company has, I would read these policies carefully. The next thing that is required from me is to have a small conversation with the employee discretely. As professional as I can be, I will mention how I feel his or her dress code is inappropriate and try to summon the employee by asking him or her whether they are fully aware of the appropriate dress code. I will try to agree with the employee on what is appropriate and what is not. If we agree, requesting the employee to home and change clothes is unnecessary, but if the need to do that arises, I would consider that to be an option.

olga2289 [7]3 years ago
6 0

this is late, but for future people, the answer is B

You might be interested in
The location on the Word screen where text will be entered is known as the _____.
mixas84 [53]
Insertion point is represented by blinking vertical line
4 0
3 years ago
Need to know? Anyone feel like helping me not fail
8_murik_8 [283]
I’m not sure but i think it might be design
4 0
3 years ago
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
Describe two differences between landscape mode and portrait mode. Respond in 2-3 complete sentences.
Mice21 [21]

Answer:

they just are different

Explanation:

3 0
3 years ago
Read 2 more answers
1.) A ____ is a piece of information.
alukav5142 [94]

Answer:

pasensya na Hindi ko alam Ang sasabihin

5 0
3 years ago
Other questions:
  • A network technician is assisting the security team with some traffic captures. The security team wants to capture all traffic o
    9·1 answer
  • . What is automated testing?
    10·1 answer
  • Why is statistics important?
    6·1 answer
  • Pleas help 99 points and get brainliest
    9·2 answers
  • Which function in Excel tells how many
    6·1 answer
  • Which of the following statements about security in the network is true?
    15·1 answer
  • Need answer ASAP. I’ll mark brainliest if correct
    7·1 answer
  • If Anime Characters were real , Who Would Your Anime Wife Would Be (Tell Who And Why)
    10·1 answer
  • How do you open an application on the macOS?
    11·2 answers
  • Which automatic startup option should you choose when windows' startup fails immediately after installing a new driver but befor
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!