1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lunna [17]
4 years ago
13

Erica is CEO of a company and has recently hired a vice president of marketing. She would like to share this information with al

l three thousand employees. Erica should _____.
call each employee
send an e-mail to all employees
type a word processing document and print it
use diagramming software to create a chart
Computers and Technology
2 answers:
EleoNora [17]4 years ago
6 0
B: Send an e-mail to all employees
liraira [26]4 years ago
6 0

Answer:

The correct answer is send an e-mail to all employees.

Explanation:

The correct answer is send an e-mail to all employees.

I am going to explain the why of each options.

call each employee

There are three thousand employees. There is just not enough time to call each employee.

send an e-mail to all employees

The most practical way, as it takes just the time to write the email and send to a list containing all employees.

type a word processing document and print it

use diagramming software to create a chart

With these alternatives, most of the employees would not see the information.

You might be interested in
Sort Sorts by value; assign new numbers as the keys.
JulijaS [17]

Answer: (a) sort()

Explanation:

Using sort() the keys are not preserved. However it sorts the array.

example : sort($array);

6 0
4 years ago
Co to jest podprogram (procedura lub funkcja)? Zaznacz poprawną odpowiedź. a) Wielokrotne powtarzanie tych samych poleceń. b) Wy
ale4655 [162]

Answer:

  b)  A separate part of the program that performs a specific task.

Explanation:

A subroutine is a portion of the program that can be invoked to perform a specific task. Typically, it performs that task and returns execution control to the point immediately following its invocation. It may or may not maintain "history" or "state", and it may or may not throw exceptions.

A well-behaved subroutine will only operate on data passed to it, will not maintain any internal history or state, and will have only one exit.

8 0
3 years ago
A(n) __________ is a popular way to describe relationships? (i.e., one-to-one,? one-to-many) in a relational database.
Leto [7]
A link is a popular way to describe relationships in a relational database.
There are three types of relationships (links) between tables:
1. One-to-one <span>relationship , that allows only one record on each side of the relationship.
2. </span>One-to-many <span>relationship, that allows a single record in one table to be related to multiple records in another table.
3. </span>Many-to-many<span> relationship, in which many records in a table can link to many records in another table. F</span>
6 0
3 years ago
What is the Slide Sorter View used for?
bonufazy [111]

Answer:

b. bc u can delete and add slides in ur presentation

3 0
3 years ago
Read 2 more answers
What are the possible consequences of intentional virus setting?
natali 33 [55]

<u>The possible consequences of intentional virus setting:</u>

Virus is nothing but desktop or laptop or tablet OS has to do certain process as on its own which diverse other  to different process  such us stealing the data from desktop or laptop or tablet and making slow the performance of desktop and laptop  and tablet.

To avoid or protect the computer there are two type of antivirus.

  • On desktop or tablet or laptop. (It is called resident firewall).
  • Internet gateway. (It is called firewall)

So company create virus and to rectify they make money of that process.

To protect our desktop or laptop or tablet from virus we are protected with law. In case due to virus attacked our laptop or desktop or tablet Is effected we can fine the or sent to jail by law.

3 0
3 years ago
Other questions:
  • Which statements about Excel's FV function are correct?
    13·1 answer
  • Write a main method that prompts the user for an integer between 1 &amp; 20 (inclusive). If the user enters an invalid number, p
    8·1 answer
  • What is the energy conversion and the law used in the given scenario?
    13·1 answer
  • Jed is the database administrator for a mid-sized computer component manufacturer. He is responsible for validating the data mod
    12·1 answer
  • Which of the following is an example of batch processing?
    14·1 answer
  • You just installed a new application but users cannot connect to the application remotely. Which feature should be checked to en
    14·1 answer
  • Which of the following statements is NOT true regarding the Security Configuration and Analysis (SCA) tool?
    12·1 answer
  • Kareem is working on a project for his manager. He has a few questions for a co-worker who he knows is knowledgeable on the subj
    7·1 answer
  • Which of the data repositories serves as a pool of raw data and stores large amounts of structured, semi-structured, and unstruc
    9·1 answer
  • Which view displays the records in columns and rows like excel worksheet​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!