1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
3 years ago
5

In addition to key executives, there are other positions in a company that may be considered critical, or whose loss will be dif

ficult for the company. What will happen if a network administrator leaves? What customers or contacts would the company lose if a sales representative leaves? What other positions can you name where a loss would have a potentially significant negative effect on the company?
Computers and Technology
1 answer:
Otrada [13]3 years ago
5 0

Answer:

Explanation:

Every employee who works for a company plays an important role in his field. some of the key employees of a company is sales representative, marketing executives, human resource managers, etc

whereas in manufacturing sector additional employees are developers, manufacturing workers, quality testers, etc, which when leaves a company, there is always a chance for the employee to join the competitors which is a threat to integrity of a company

Plus particular field becomes unstable for that time until a good employee hire again for the same position.

If a network administrator leaves, the company may suffer from their network issues. as a network administrator maintain networks, troubleshoot with any network problem, checks the security of the network and many more, he plays a very important role in the company.

If a sales representative leaves the job from the company, sometimes it results as a great loss of a company as a sales representative is in direct contact with customers, and when they leave a job there are chances that they carry the customer with them which results in loss of business.

You might be interested in
Why do networks need standards?
svetoff [14.1K]

Answer:

4. Standards are what guarantee that the different pieces of network are configured to communicate with one another

Explanation:

Networking standards ensure the interoperability of networking technologies by defining the rules of communication among networked devices. Networking standards exist to help ensure products of different vendors are able to work together in a network without risk of incompatibility

Hope it will help you...

3 0
3 years ago
Read the following scenario:
Fofino [41]

Answer:

I think it is the second answer choice honestly

Explanation:

I'm gonna say either the first one or second one because the word film has something to with behind the scenes work not being an actor.

8 0
3 years ago
Read 2 more answers
Given a sorted list of integers, output the middle integer. assume the number of integers is always odd.
Svetllana [295]

integer userInput

integer i

integer mid

integer array(20) number

userInput = 1

for i = 0; userInput >= 0; i = i + 1

  if number[i] > -1

     userInput = Get next input

     number[i] = userInput

i = i - 1

mid = i / 2

if i > 9

  Put "Too many inputs" to output

elseif i % 2 == 0

  Put number[mid - 1] to output

else

  Put number[mid] to output

4 0
2 years ago
Why should we be careful about opening email attachments?
quester [9]

Answer:

files can easily infect your computer with viruses or malware.

Explanation:

8 0
3 years ago
Read 2 more answers
What is one requirement for achieving Continuous Deployment
worty [1.4K]

Answer:

You need to get everything in version control. You need to automate the entire environment creation process.

Explanation:

You need a deployment pipeline where you can create test and production environments, and then deploy code into them, entirely on demand.

hope this helped ^^

7 0
3 years ago
Read 2 more answers
Other questions:
  • How many keywords are there in C programming language
    8·1 answer
  • #Write a function called string_finder. string_finder should #take two parameters: a target string and a search string. #The fun
    14·1 answer
  • A byte contains how many bits? Question 3 options:
    13·2 answers
  • The set of instructions that tell the computer what to do are called ____.
    13·2 answers
  • Distinguish between exponentiation and modulus. Be specific.
    5·1 answer
  • What type of Microsoft Server serves as an email server?
    7·2 answers
  • The _____ feature will mark all changes made to a document for others to review at a later time.
    13·1 answer
  • 3.
    12·1 answer
  • What approach do you prefer to take when creating presentations for class projects? Would you rather use software or create pres
    12·2 answers
  • What three best practices can help defend against social engineering attacks?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!