1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zloy xaker [14]
3 years ago
5

Paragraph: Read the following two e-mail messages. In three to five sentences, explain why E-mail B is the more appropriate work

place e-mail. Remember to consider netiquette guidelines in your response. E-mail A: DUDE! You totally shorted me on my paycheck! I seriously am upset. It is majorly less than it shold be. I totally worked overtime last pay period!!!! YOU NEED TO FIX THIS RIGHT AWAY. I am going shopping this weekend and i need my cash. E-mail B: When I got my paycheck, I noticed that it was less than I expected. It looks like I did not receive overtime pay for the extra hours I worked last pay period. Can you please review this and let me know how I can get this corrected?
Computers and Technology
1 answer:
exis [7]3 years ago
4 0
E-mail B is the more appropriate workplace e-mail because it’s straightforward, polite, and professional. E-mail A was more accusatory and aggressive, and many people don’t like when they’re being yelled at or accused of something and, as a result, this person may start to dislike that coworker. However, the second e-mail was more polite and made the receiver think of them as a respectful person so that they’re happy to help them out.
You might be interested in
An Accenture healthcare client is interested in implementing an Artificial Intelligence solution to improve patient care but, is
Evgesh-ka [11]

Answer:

the best course of action would be to hold a demonstration for them

Explanation:

For individuals/clients that do not understand the technology, the best course of action would be to hold a demonstration for them. Set up a meeting with the client and show them a demonstration of the Artificial Intelligence solution/software in person. Allow them to see what the software can do in a test environment and answer any and all questions that the client may have. This will allow the client to get an idea of how the solution can benefit them and also clear up any doubts/fears that they may be having regarding implementation. This would be the best way to bring such a client onboard.

4 0
3 years ago
________ technology uses radio frequency identification (RFID) tags to identify and monitor the movement of each individual prod
Agata [3.3K]

Answer:

The correct answer to the following question will be Option A (​EPC (Electronic product code)).

Explanation:

  • The EPC is built as a global identifier providing, for all time, distinct identity for any physical thing anywhere in the world.
  • This technology enables the use of RFID tags to classify and track the resistance of every other individual item.

No other alternative will be capable of performing these activities or use the RFID tags in any other way. So choice A is the correct answer.

4 0
3 years ago
Write which of the ovals (A, B, C, or D) is placed around code that best meets the criteria as a student-developed algorithm. Ex
lianna [129]

Answer:

The answer to this question can be defined as follows:

Explanation:

In the given question, some information is missing, that attachment of the image files code, So, the code to the question can add in an image file, and explanation to this question can be described as follows:

  • In option 4, In drawSquare method, it is positioned across the abstraction, as it is across a method, that compresses many lines of code all in one.
  • In option 1, The moveTo method is the rule. Throughout in option 4, and in option 2, is a request to function, which is defined in option 3, that is the for-loop.

7 0
3 years ago
Injection attacks variants can occur whenever one program invokes the services of another program, service, or function and pass
velikii [3]

Answer:

True

Explanation:

In Computer science, It's true that injection attacks variants can occur whenever one program invokes the services of another program, service, or function and passes to it externally sourced, potentially untrusted information without sufficient inspection and validation of it.

5 0
3 years ago
List the instructions of how you would make a PBJ sandwich as a series of five (5) steps (tasks) in the first column Complete th
Paraphin [41]

Answer:

Explanation:

In order to make a PBJ sandwich you would first need to obtain all of the ingredients which are the following

  • Peanut Butter
  • Jam (of choice)
  • whole wheat bread
  • spreading knife
  • cutting knife

Once you have all of the ingredients follow these instructions to make the sandwich

  1. place 2 slices of bread seperately on the plate
  2. Using the spreading knife place the amount of peanut butter that you want on one of the breads and spread evenly (the bread may break on this step so be careful)
  3. Using the spreading knife place the amount of Jam that you want on the other slice of bread and spread evenly (the bread may break on this step so be careful)
  4. Place Bread together and cut the edges off using a cutting knife.
  5. Eat and Enjoy. (problem: you may become addicted)
3 0
3 years ago
Other questions:
  • Give reasons why mind-mapping software is important to project development.
    14·1 answer
  • What is the last step in conducting url search
    11·1 answer
  • The two types of objects responsible for collecting data are
    14·1 answer
  • If I wanted to repeat an action such as a heading for a paper, it would be helpful to _____.
    15·2 answers
  • Once sales are​ forecasted, ________ must be generated to estimate required raw materials. A. a pro forma statement B. a product
    8·1 answer
  • When doing a Risk assessment, what is one of the most important things to do?
    8·2 answers
  • What is computer science​
    9·1 answer
  • Select the correct answer.
    6·1 answer
  • Why is it important to prepare the farm resources before you start working? explain​
    14·1 answer
  • What is the impact of ict on school policy<br>​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!