1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Afina-wow [57]
4 years ago
5

As you move through your professional career, you will receive requests for favors and contributions. You will not be able to ho

nor all the requests you receive and will sometimes refuse requests. When refusing a request, first think about the receiver, and then determine the approach for your message.
Computers and Technology
1 answer:
Alika [10]4 years ago
8 0

Growing professionally comes with advises, comments (solicited and unsolicited), request for favours and also contributions. Moving up your professional career from the days of little beginning have always been accompanied with all of the requests and comments. As one levitates successfully, requests and contributions tend to increase. This can be scary and at the same time tiring as you go to question the sensibility of some of your decisions. While being inundated with these ’assistance', it is important that you carefully and thoroughly select the comments, contributions, requests of favours etc that is worth responding to. While some would be considered others will be discarded. Now, the question is how best can we politely turndown a person's request of favours and contributions without sounding rude, ungratetul and condescending. Both useful and irrelevant contributions deserve good responses. We could start by appreciating the request for favours and contributions, and tell whomsoever it may concern that you appreciate his/her assistance but unfortunately would not be needing them.

You might be interested in
A program virus infect​
Darya [45]

Explanation:

Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.

MARK AS BRAINLIST IF IT IS USEFUL

7 0
3 years ago
A character that <br>is raised and smaller above the baseline is called​
alexandr1967 [171]

Answer:

A character that  is raised and smaller above the baseline is called​ a superscript.

Explanation:

  • A character that  is raised and smaller above the baseline is called​ a superscript.

For example, let 'a' be the number and 'n' is the exponent power of the number 3.

aⁿ

The number 'n' above the number 'a' is an example of a superscript.

In another example, let the expression be

4⁶

The number 6 above the number 4 is an example of a superscript.

Therefore, we conclude that a character that  is raised and smaller above the baseline is called​ a superscript.

6 0
3 years ago
Sheela often forgets what she needs to do throughout the day, and she misses meetings and deadlines to submit reports. Which ema
igor_vitrenko [27]

I believe this would be D. Maintaing a task list, because this would help her to see what she has schedules, what she has to submit, all the tasks that would need completed.

Hope this helps!

3 0
3 years ago
Read 2 more answers
How are appointments scheduled in medisoft
qaws [65]
Appointments scheduled in medisoft is based on how
•How quickly making, copying, or changing appointments
•Track treatment room schedules
•Instantaneously search all providers for next available time slot
•Add patients to an appointment wait list

4 0
4 years ago
Type the correct answer in the box. Spell all words correctly.
marysya [2.9K]

Answer:

A Standard Lens

Explanation:

Since David wants to take pictures of people around him and also the objects far away, a standard lens would be fit for that.

3 0
3 years ago
Other questions:
  • Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first
    6·1 answer
  • The degree to which a firewall can impose user access restrictions is known as which of the following?Security assurancePrivileg
    8·1 answer
  • What is the 5 basic steps of computer programing?
    6·1 answer
  • Write a program that prompts the user to enter three cities and displays them in ascending order. Here is a sample run: Enter th
    8·1 answer
  • Holi alguien sabe como cambiar el gamertag en XBox App (para iOS)?
    9·1 answer
  • 6.7 — Trickier Trap 4
    7·2 answers
  • What are the steps in preparing a bootable USB installer?​
    11·1 answer
  • What are the components of a web page???
    9·2 answers
  • 2. Cryptography relies on open standards - a protocol or standard that is publicly available. Why are open standards necessary
    5·1 answer
  • Write a python program to check whether the number is divisible by 7. If its divisible, print its divisible otherwise find previ
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!