1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zloy xaker [14]
4 years ago
5

Paragraph: Read the following two e-mail messages. In three to five sentences, explain why E-mail B is the more appropriate work

place e-mail. Remember to consider netiquette guidelines in your response. E-mail A: DUDE! You totally shorted me on my paycheck! I seriously am upset. It is majorly less than it shold be. I totally worked overtime last pay period!!!! YOU NEED TO FIX THIS RIGHT AWAY. I am going shopping this weekend and i need my cash. E-mail B: When I got my paycheck, I noticed that it was less than I expected. It looks like I did not receive overtime pay for the extra hours I worked last pay period. Can you please review this and let me know how I can get this corrected?
Computers and Technology
1 answer:
exis [7]4 years ago
4 0
E-mail B is the more appropriate workplace e-mail because it’s straightforward, polite, and professional. E-mail A was more accusatory and aggressive, and many people don’t like when they’re being yelled at or accused of something and, as a result, this person may start to dislike that coworker. However, the second e-mail was more polite and made the receiver think of them as a respectful person so that they’re happy to help them out.
You might be interested in
A cloud service provider uses the Internet to deliver a computing environment for developing, running, and managing software app
MakcuM [25]

The answer is PaaS (Platform as a Service)  

PaaS provides users with a cloud runtime environment in which they can develop, test, manage, and deliver applications. Users are able to use a suite of pre-built tools to develop and test their own apps. Thanks to these solutions, developers are able to deploy applications without the need of infrastructures such as servers, operating systems, or development tools.


6 0
3 years ago
Convert decimal number 126.375 to binary (3 bits after binary point)
nevsk [136]

Answer:

126.375 in binary is: 1111110.011

Explanation:

In order to convert a decimal number to binary number system, the integral part is converted using the division and remainder method while the fractional part is multiplied with 2 and the integral part of answer is noted down. The fractional part is again multiplied with 2 and so on.

For 126.375

2         126

2          63 - 0

2          31 - 1

2          15 - 1

2            7 - 1

2            3 - 1

              1 - 1

So, 126 = 1111110

For 0.375

0.375 * 2 = 0.75

0.75 * 2 = 1.5

0.5 * 2 = 1.0

As we had to only find 3 digits after binary point, so

0.375 = 011

So 126.375 in binary is: 1111110.011 ..

8 0
3 years ago
How can artificial intelligence be used in learning science?
tiny-mole [99]

Artificial intelligence can be used to help science students research and verify their research. It is also a very interesting topic to study in general.

Hope that helped!!! k

5 0
4 years ago
The binary number represented by the voltage graph below is
ozzi

Answer:

The binary number represented by the voltage graph is bits

Explanation:

7 0
3 years ago
Example: An amount of $1,500.00 is deposited in a bank paying an annual interest rate of 4.3%, compounded quarterly. What is the
maw [93]

Answer:

the answer is

Explanation:

3 0
4 years ago
Other questions:
  • Given a string variable named sentence that has been initialized , write an expression whose value is the the very last characte
    14·1 answer
  • Which internet resource can you use to publicly describe an adventure trip you recently made?
    6·2 answers
  • Use a recursion tree to determine a good asymptotic upper bound on the recurrence T(n) = 4T(n/2 + 2) + n. Use the substitution m
    5·1 answer
  • Will my ethernet adapter stop eveyone from getting WiFi if connected to my laptop ?
    5·1 answer
  • What is a phonograph?
    15·2 answers
  • Write a program in Cto define a structure Patient that has the following members
    12·1 answer
  • In most software programs, which color arrows selects the points in a vector
    14·1 answer
  • In large organizations, there is a formal business function that includes developing an information policy, planning for data, o
    8·1 answer
  • Suppose that a t-shirt comes in five sizes: S, M, L, XL, XXL. Each size comes in four colors. How many possible t-shirts are the
    11·1 answer
  • a company recently implemented a secure sockets layer/transport layer security (ssl/tls) version that supports secure hashing al
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!