1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Afina-wow [57]
4 years ago
5

As you move through your professional career, you will receive requests for favors and contributions. You will not be able to ho

nor all the requests you receive and will sometimes refuse requests. When refusing a request, first think about the receiver, and then determine the approach for your message.
Computers and Technology
1 answer:
Alika [10]4 years ago
8 0

Growing professionally comes with advises, comments (solicited and unsolicited), request for favours and also contributions. Moving up your professional career from the days of little beginning have always been accompanied with all of the requests and comments. As one levitates successfully, requests and contributions tend to increase. This can be scary and at the same time tiring as you go to question the sensibility of some of your decisions. While being inundated with these ’assistance', it is important that you carefully and thoroughly select the comments, contributions, requests of favours etc that is worth responding to. While some would be considered others will be discarded. Now, the question is how best can we politely turndown a person's request of favours and contributions without sounding rude, ungratetul and condescending. Both useful and irrelevant contributions deserve good responses. We could start by appreciating the request for favours and contributions, and tell whomsoever it may concern that you appreciate his/her assistance but unfortunately would not be needing them.

You might be interested in
Which is true about POP3 and IMAP for incoming email?
Novay_Z [31]

Answer:

Both keep email on an email server by default

Explanation:

IMAP synchronises emails, while POP3 downloads them for offline use.

7 0
3 years ago
What is the full form of computer​
Annette [7]

Answer:

Common Operating Machine Purposely Used for Technological and Educational Research

Explanation:

4 0
3 years ago
Read 2 more answers
-What is/are the goal/s of Business Intelligence systems?
8_murik_8 [283]

Answer: Business intelligence system is a system that is used in the field of business and organizations for generations of the strategy and plans to make decision. This system consist of the business intelligence(BI) tools. It creates a connection in the different information/data and takes them to the business organization.

Business intelligence system has goals like:-

  • Increasing daily sales
  • Fast the growth rate of the business
  • improving the rental performance
  • Gaining more profit

5 0
3 years ago
Who<br> invented the term “debugging”?
Black_prince [1.1K]

Grace Murray Hopper invented it

8 0
3 years ago
Read 2 more answers
When is blue for when the instance in which the directory of compulsion in the air!
KATRIN_1 [288]
I think it’s what the other person said
7 0
3 years ago
Other questions:
  • A virus that attaches to an executable program can do anything that the program is permitted to do.
    7·1 answer
  • Are mechanical keyboards more expensive than membrane keyboards?
    9·2 answers
  • In this lab you used the sharing and storage management console to create a simple volume. what must you do to create a differen
    13·1 answer
  • In terms of online safety, what is the grooming process, (predators).
    5·2 answers
  • Assume that passwords are selected from four-character combinations of 26 alphabeticcharacters. Assume that an adversary is able
    11·1 answer
  • Why did Herman Hollerith invent the Tabulating Machine?
    10·1 answer
  • Is a MODEM required for Internet Connectivity ?<br> Yes<br> No
    9·2 answers
  • Which type of word processing programs enables users to include illustrations within the program?
    10·2 answers
  • Ple Choice Worth 5 points)
    11·1 answer
  • ___________ is some danger that can exploit a vulnerability.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!