1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lunna [17]
4 years ago
13

Erica is CEO of a company and has recently hired a vice president of marketing. She would like to share this information with al

l three thousand employees. Erica should _____.
call each employee
send an e-mail to all employees
type a word processing document and print it
use diagramming software to create a chart
Computers and Technology
2 answers:
EleoNora [17]4 years ago
6 0
B: Send an e-mail to all employees
liraira [26]4 years ago
6 0

Answer:

The correct answer is send an e-mail to all employees.

Explanation:

The correct answer is send an e-mail to all employees.

I am going to explain the why of each options.

call each employee

There are three thousand employees. There is just not enough time to call each employee.

send an e-mail to all employees

The most practical way, as it takes just the time to write the email and send to a list containing all employees.

type a word processing document and print it

use diagramming software to create a chart

With these alternatives, most of the employees would not see the information.

You might be interested in
Which task manager tab provides details about how a program uses system resources?
almond37 [142]
It will be the performance tab.
8 0
3 years ago
Pendant Publishing edits multi-volume manuscripts for many authors. For each volume, they want a label that contains the author'
lbvjy [14]

Answer:

Check the explanation

Explanation:

Pseudocode For Reading File:

start

Declarations

InputFIle records.txt

OutputFile result.txt

string authorName

string title

int numOfVol

open InputFile

open OutputFile

input authorName, title, numOfVol from records.txt

while not eof

output authorName

output title

output numOfVol

end while

close records.txt

close results.txt

END

The flowchart for reading the file can be seen below.

3 0
3 years ago
Select four tasks associated with operating system maintenance. Cleaning inside the computer Defragmenting the hard drive Deleti
hram777 [196]

Answer:

Cleaning inside the computer

Defragmenting the hard drive

Deleting temporary files

Organizing data

Explanation:

7 0
3 years ago
Digital rights include the right to
faltersainse [42]
D. Speak your ideas with respect on the internet .
7 0
2 years ago
What is virtual reality?
Burka [1]
The computer-generated simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way by a person using special electronic equipment, such as a helmet with a screen inside or gloves fitted with sensors.
4 0
4 years ago
Other questions:
  • Over the last few years, security cameras and other devices have become more common. Some people argue that these measures viola
    14·2 answers
  • PLEASE HELP ME ASP<br> An ISDN carries a signal in digital form.<br><br> True<br><br> False
    12·2 answers
  • A ___________ is similar to Computer Integrated Manufacturing, but is based much more on standard reusable application software
    5·1 answer
  • Dillard’s wants to learn about its consumers' attitudes toward online purchases. There are numerous studies that are available a
    9·1 answer
  • When an item in a menu is black, it means that _____.
    6·2 answers
  • The order of precedence is very important when building formulas in Excel. Which of the following formulas will produce 778 as t
    11·1 answer
  • Widow in respect to word processing ​
    15·1 answer
  • Can anyone help me figure out why my if statements are not executing properly? When the program executes with 7 as the value for
    12·1 answer
  • I have the requirements for Ace rank on Brainly but hasn't given me it yet. Does it just take longer than normal ranks or someth
    15·2 answers
  • After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!