1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
15

When you expect a reader of your message to be uninterested, unwilling, displeased, or hostile, you should Group of answer choic

es begin with the main idea. put the bad news first. send the message via e-mail, text message, or IM. explain all background information first.
Computers and Technology
1 answer:
omeli [17]3 years ago
8 0

Answer:

explain all background information first.

Explanation:

Now if you are to deliver a message and you have suspicions that the person who is to read it might be uninterested, unwilling, hostile or displeased, you should put the main idea later in the message. That is, it should come after you have provided details given explanations or evidence.

It is not right to start with bad news. As a matter of fact bad news should not be shared through mails, IM or texts.

You might be interested in
In Windows 7/Vista, the information that establishes basic settings such as the location of the operating system and other key s
mel-nik [20]
Bios, This stores all of the computers start-up information. It tells the computer where to find the operation system inside the main storage and how to start it.

Hope this helps! :)
7 0
3 years ago
Nicotine us a dangerous chemical found in Cigarettes; it is accompanied by two other very harmful chemicals. These are
NNADVOKAT [17]

Answer: Carbon Monoxide and Tar.

4 0
3 years ago
Howard is leading a project to commission a new information system that will be used by a federal government agency. He is worki
Ann [662]

Answer:

The correct answer is A.

Explanation:

Given the example in the question, Howard is at the step of implementing security controls.

There are five official steps for the risk management framework.

  1. Categorizing The Information System: In this step, the IT system's objectives are assigned based on the current mission or project.
  2. Selecting Security Controls: After the risk assesment is done, the security controls for technical, hardware and software problems are decided according to the outcome.
  3. Implementing Security Controls: In this step, the points that were decided in the step before are put into action.
  4. Authorizing The Information System: Authorization for the risk management is approved and monitored.
  5. Monitoring Security Controls: The authorities keep monitoring the process and makes any necessary changes and updates.

The process that is explained in the question is step 3, which is given in option A.

I hope this answer helps.

5 0
3 years ago
Which is better? iPhone 11 Pro Max or Samsung Galaxy Note 20 Ultra 5G and why?
Allisa [31]

Answer:

Samsung note 20 or iPhone but i think Samsung

Explanation:

8 0
3 years ago
Read 2 more answers
What is the scope of each variable?
kari74 [83]

Answer:

scope of pet name is limited to pet class and color is accessible to the whole program

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Array A is not a heap. Clearly explain why does above tree not a heap? b) Using build heap procedure discussed in the class, con
    15·1 answer
  • A machine is classified as a compound machine if it?
    8·2 answers
  • How do you increase the amount of data in a sampled Google Analytics report?
    8·1 answer
  • The following 2D array has been created:
    12·2 answers
  • In 2-3 sentences, describe a case where circuit-switching is better than packet-switching?
    9·1 answer
  • Which custom configuration is most likely to include a raid array?
    14·1 answer
  • before Katie turns in the paper she typed she wants a peer to review it and give her feedback Katie uses her all in one printer
    10·1 answer
  • What was that show where lowe’s were based off eye colors and the main character had orange eyes that let her mind control peopl
    14·2 answers
  • A researcher is interested in learning more about the different kinds of plants growing in different areas of the state she live
    8·1 answer
  • write a recursive bool valued function containsvowel that accepts a string and returns true if the string contains a vowel
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!