1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gayaneshka [121]
3 years ago
15

When is e-mail an appropriate channel for goodwill messages? If you frequently communicate with the receiver by e-mail and are c

ertain the message won’t get lost Never When you don’t have a stamp or appropriate company letterhead
Computers and Technology
1 answer:
pshichka [43]3 years ago
8 0

Answer: E-mail is an appropriate channel for goodwill messages when frequently communicate with the receiver by e-mail and are certain the message won’t get lost

Explanation:

Email is a fast and easy mode of communication in current time.

We can send a goodwill message to someone using email if we communicate frequently with that person.

This makes it easy to do a follow up also in case required.

Goodwill message should be written in simple sentences but should be sincere enough to convey the message to receiver. It short be short and caring.

Goodwill message contains a thanks expressing message from sender's side.

It might be sent for showing some sympathy, for example in case of any illness.

It can also be sent to recognize receiver for some good work that he has done.

You might be interested in
I need help thanks please!
maw [93]

Answer:

a) to persuade

she is doing this to propose an idea to the boss of the company

6 0
3 years ago
Read 2 more answers
Which organization safeguards americans from health, safety, and security hazards and threats?
Mrrafil [7]

OSHA (Occupational Safety and Health Administration)

4 0
3 years ago
Read 2 more answers
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
2 years ago
Read 2 more answers
What form of note taking would be MOST beneficial for a visual learner who needs to see the connections between ideas?
Svetlanka [38]

Answer:

Think link

Explanation:

8 0
3 years ago
Why did the Apostles choose deacons to help them?
Lena [83]

Answer:

Idk

Explanation:

Ikd

7 0
3 years ago
Other questions:
  • Your brother is a video producer and is looking to buy some sort of new computing device. he needs a lot of memory and processin
    11·1 answer
  • Some people are unable to arrange six matches to form four equilateral triangles because they fail to consider a three - dimensi
    6·1 answer
  • For which task is the WordArt gallery most useful?
    15·2 answers
  • What is the part of the browser window that displays the content of the web page such as pictures and text called?
    10·1 answer
  • A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate p
    13·1 answer
  • How to write a program to draw 1000 random points on a frame in python language for coding?
    13·1 answer
  • When you insert a photo into a document, its placed at the ​
    13·2 answers
  • What does the CFO of a company do
    14·1 answer
  • Ssssssssssssssssssssssssssssssssssssssssssssssssss 100 points for this answer too.
    10·1 answer
  • When it comes to credit scores, why is having a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!