1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRINA_888 [86]
2 years ago
14

You are the manager and an employee shows up for his shift dressed inappropriately for work. What should you do?

Computers and Technology
2 answers:
yarga [219]2 years ago
7 0

Most managers see inappropriate dressing every day. Some are left angered while some are confused as to what is the right way to approach such situations. What follows next needs to be professional oriented. Being the manager, I would start by finding out what the appropriate dressing policies are. Some companies might have dress code policies while others might not. Assuming that this company has, I would read these policies carefully. The next thing that is required from me is to have a small conversation with the employee discretely. As professional as I can be, I will mention how I feel his or her dress code is inappropriate and try to summon the employee by asking him or her whether they are fully aware of the appropriate dress code. I will try to agree with the employee on what is appropriate and what is not. If we agree, requesting the employee to home and change clothes is unnecessary, but if the need to do that arises, I would consider that to be an option.

olga2289 [7]2 years ago
6 0

this is late, but for future people, the answer is B

You might be interested in
How do i answer a qestion on brainly
viva [34]

Answer:

Click on an answer, then click "Add Answer +(?)"

Explanation:

This way you'll be able to add a question to any brainly question that you are able to add a question to. Such as this one. You will receive half the points that the person asking the question assigned to the question, with the minimum being 10 points. After this you will receive those points and be able to write a response much like this one allowing you and 1 other person to answer the same question and received thanks and or brainliest by which the user asking the question can give out to the person who they believe gave the best answer.

Hope this helps! <3

5 0
2 years ago
Which of the following are the lines defining the borders of a shape? (1 point)
shtirl [24]

Answer:

no I is edges

2 is gaming

3 is creativity

3 0
3 years ago
In Mandatory Access Control sensitivity labels attached to object contain what information?
larisa86 [58]

Answer:b)The item’s classification and category set

Explanation: Mandatory access control(MAC) is the security component in the computer system. It is regarding the controlling the access of the operating system by the administrator.The accessing is made limited by the MAC according to the sensitivity of the data .

The authorization for user to access the system is based on this sensitivity level known sensitivity label. The objects contain the information regarding the classification and categories or level of items. Thus, the correct option is option(b).

7 0
3 years ago
On the line below, write two ways page numbers can be added to a document.
IgorC [24]

Answer: wiriting it and printing it

Explanation: duh

8 0
2 years ago
PGP encryption can be performed from the command line as well. What is the PGP command line syntax to encrypt the my-message.txt
Mrac [35]

Answer:

pgp --encrypt "my-message.txt" --recipient (Sean) --output ("secret-message.txt.gpg")

Explanation:

PGP encryption from the command line can be done using the following format:

  • pgp --encrypt (input) --recipient (user) --output (output file)

Therefore, PGP command line syntax to encrypt the my-message.txt file for a specific user (Sean) and save the output as secret-message.txt.gpg is:

  • pgp --encrypt "my-message.txt" --recipient (Sean) --output ("secret-message.txt.gpg")
6 0
3 years ago
Other questions:
  • How to download music to your mp3 player off computer
    6·1 answer
  • To check spelling errors in a document, the Word application uses the _____ to determine appropriate spelling.
    7·2 answers
  • All of the following are helpful tips for protecting your digital privacy, except:
    10·2 answers
  • A collection of computers, printers, routers, switches, and other devices
    15·1 answer
  • What does coding mean​
    10·2 answers
  • Data type can only be true or false <br><br> Answer: Bool
    15·1 answer
  • Decision support systems help managers use structured data to identify problems and find solutions to business-related problems.
    10·1 answer
  • Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-
    13·1 answer
  • what is the name of the program that enables the device and operating system to communicate with each other?
    7·1 answer
  • 1. Fill in the blanks with appropriate word. 5°1-5 is a collection of raw unprocessed facts, figures, and symbols ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!