1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nezavi [6.7K]
4 years ago
6

Jim is expecting a very busy weekend at his store, so he sent the following e-mail to his employees: ALL EMPLOYEES MUST WORK THI

S WEEKEND. NO TIME OFF WILL BE GRANTED. NO
EXCEPTIONS!!!!!! What is the most likely reason why this communication is not effective?
Computers and Technology
1 answer:
Salsk061 [2.6K]4 years ago
5 0

Answer:

The caps and bold letters makes it seem like his boss is yelling at him.

Explanation:

You might be interested in
Which of the following is a useful policy to minimize waste and mistakes?
anastassius [24]

Answer:

Option C

Explanation:

To ensure correct input data, proper  procedure is must in order to minimize waste and mistakes.

5 0
3 years ago
When you're working with a word processing document and you press the Del key, what happens? A. The paragraph you're working on
Bezzdna [24]
Option c. The entire document is deleted




4 0
3 years ago
Which type of information should never be given out on social media?
zhenek [66]

Answer:

Sites like Face.book are full of valuable data for people who use social engineering to steal your identity on social media. You should therefore avoid sharing information that's used to verify your identity,

Explanation:

7 0
3 years ago
Read 2 more answers
What are the three fundamental elements of an effective security program for information systems?
marishachu [46]
<span>the three fundamental elements of an effective security program for information systems are Identification, Authentication and Authorization.The access control creates the user and assigns the rights to resources and authorization is giving permissions to the users to access the resources.The user who wants to enter the system should have a valid data t enter the system like password, fingerprint or any other type of recognition.</span>
4 0
3 years ago
Read 2 more answers
Which tool could be used to display only rows containing presidents who served two terms?
kherson [118]

Answer: The tool that could be used to display only the rows containing the presidents who served two terms is the<u> Filter.</u>

Explanation:

If you are using Excel the filter tool is a great way to find the relevant information you are searching for. This will remove all other data from the search results, in this case presidents that only served one term.

The filtering of rows can be used three ways;

  • By the value
  • By the criteria
  • By the format

By using the filter, you can find any phrase, number, dates, etc. Multiple columns can be filtered at the same time. Also, blank cells can be filtered out.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Susan will be configuring a snort network ids sensor to monitor her subnetwork. she will be using a web-based console interface
    8·1 answer
  • The Microsoft-NanoServer-Guest-Package installs the drivers necessary for installing Nano Server as a host OS on a physical mach
    15·1 answer
  • . A register in a computer has a of bits. How many unique combinations can be stored in the register?
    5·1 answer
  • Click _______ to view each individual record of a mail merge document.
    5·2 answers
  • One of the disadvantages of an e-marketplace is that it cannot provide a single platform for prices. true or false?
    10·2 answers
  • Consider a satellite orbiting the earth. Its position above the earth is specified in polar coordinates. Find a model-view matri
    12·1 answer
  • I'm gonna get grounded for getting a 52 on my test :(
    13·1 answer
  • How should a Salesforce Admin fulfill those requirements? Universal Containers launches a Partner Community for their resellers
    13·1 answer
  • How do you delete questions you asked?
    7·2 answers
  • When Brittany practiced her presentation, she gave a trusted adult a presentation checklist to use to critique her each time she
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!