Answer:
Strategic conversation
Explanation:
The above scenario exemplifies a strategic conversation. The strategic conversation is all about deliberating the company's vision and mission. In the bigger picture, managers and CEO's usually interact quarterly or once a year to discuss and explore different strategies in order to improve the company's operations. Strategic conversations are important because they help to identify problems and their remedial solutions.
Answer:
One possible revision suggestion for the previous follow-up letter is to:
c. Identify the position he applied for and the date of the interview.
Explanation:
Stating clearly the position that Enrique interviewed for and the the date of the interview will enable the interviewer to reconsider the candidacy of Enrique for the copy-editor position. However, the wording of his first draft of the follow-up email sounds too condescending. Enrique should not display some desperation in his job-search effort.
Answer: $2,000 favorable
Explanation:
Total variable overhead variance = Budgeted variable overhead - Actual total variable overhead
Budgeted variable overhead = Budgeted machine hours allowed for actual output * Budgeted variable overhead rate per machine hour
= 30,000 * 2.50
= $75,000
Total variable overhead variance = 75,000 - 73,000
= $2,000 favorable
Favorable because the actual amount was less than the budgeted one.
Please find attached full question Answera and Explanation:
Risk posture or cybersecurity posture is the general status or overall defense of the cybersecurity program in place in an organization to guard against cyber attacks and data breaches. For a company to maintain reasonable cyber security posture as there is no fool proof cybersecurity posture, there is need for regular continuous assessment of risk exposures and potential loopholes across the company's digital infrastructure. There are different digital and sophisticated infrastructures utilized by am organizations and most if not all are well prone to cyber attacks. These infrastructures are used by employees for work e. g-email, went servers, phones, networking devices and cloud programs etc . Therefore each employee must be educated in the need to safeguard company data by looking out for traps set by cyber attackers such as phishing in email and many other loopholes. Vulnerability tests need to be performed at regular intervals and reports monitored and analyzed to protect against a potential source of cyber attack.
