1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
topjm [15]
3 years ago
13

How should a cover letter begin?

Computers and Technology
2 answers:
soldi70 [24.7K]3 years ago
5 0

Answer:

How should a cover letter begin?

A. With an informal greeting like "Hey, there!"

B. With the hiring manager's name

C. With the name of the position

D. With "To Whom it May Concern"

Explanation:

A cover letter is a written document intended as a complement to the resume where additional information related with skills and experience can be included. The cover letter should be personalized for the job being applied to, where a detailed description about why you are qualified to the job should be included. It is a way to demonstrate you are familiar with the position you are applying to and the employer, and is a good way to complement the more impersonal resume. Since the cover letter should be personalized depending on the job or company you are applying to, it should be addressed to a specific person, generally the hiring manager. Writing "To whom it may concern" may look too impersonal and/or generic, and it only should be used if you absolutely couldn't find the specific person you are writing to.

Alenkinab [10]3 years ago
4 0
To professionally adress an introduction in a cover letter D. would be the correct answer.
You might be interested in
Joe sends a scathing e-mail to his boss regarding increased work hours. Joe tries to deny sending the e-mail, but is unable to d
Crank

Answer:

The answer is E, which is Nonrepudiation

Explanation:

Nonrepudiation is the confidence attached to the fact that someone cannot deny something. It directs to the ability to ensure that a party to a contract or a communication cannot deny the authenticity of their signature on a document or the sending of a message that they originated.

3 0
3 years ago
Identify two related tables in the JustLee Books database. Identify the common field between the two tables. Decide which column
Hatshy [7]

Answer:

Answers explained below

Explanation:

<u>The two related table are: </u>

i) Books Table

ii) BOOKAUTHOR Table

<u>The common field between the two tables are: </u>

i) ISBN attribute

<u>The columns that i would like to display are: </u>

Title, ISBN, AuthorID, PubID, PubDate, Cost, Retail, Discount, Category

<u>Sql Code to join tables using where clause </u>

select t1.Title, t1.ISBN, t2.AuthorID, t1.PubID, t1.PubDate, t1.Cost, t1.Retail, t1.Discount, t1.Category from Books t1 INNER JOIN BOOKAUTHOR t2 ON t1.ISBN = t2.ISBN where t1.ISBN = 0401140733

The above query will dispaly the attributes of table "Books" and of table "BOOKAUTHOR" for book ISBN 0401140733

<u>Repeat problem 1 but remove the WHERE statement </u>

After removing the where condition we will have following join query

select t1.Title, t1.ISBN, t2.AuthorID, t1.PubID, t1.PubDate, t1.Cost, t1.Retail, t1.Discount, t1.Category from Books t1 INNER JOIN BOOKAUTHOR t2 ON t1.ISBN = t2.ISBN

The above query will display all the mapping data of table "Books" and of Table "BOOKAUTHOR"

7 0
4 years ago
A company's computers monitor assembly lines and equipment using ________ communications.
mr_godi [17]

Answer:

Machine to machine communications

Explanation:

Machine to machine communication is a type of communication that exists among the technical devices. The communication is linked either with the help of wire or through wireless. The information is communicated and transmitted with this form of communication. Human involvement or intervention is not required during the transfer of data.

6 0
4 years ago
Which of the following is considered a white collar crime?
irinina [24]

Answer:

The answer would be C if I am correct

Explanation:

The reason being is because white collar crimes are non-violent and usually are finance related and involves business or government things, so money laundering would make sense, i hope this helps

5 0
3 years ago
The short-term, 0-24 hours, parking fee, F, at an international airport is given by the following formula:  5, if 0 # h # 3 F5
jek_recluse [69]

The following code will program that prompts the user to enter the num- ber of hours a car is parked at the airport and outputs the parking fee.

<u>Explanation:</u>

Code:

#include<iostream>

using namespace std;

int main()

{

float hours;

cout <<"Enter number of hours a car parked at the airport: "; // prompt the user to enter hours.

cin >> hours ; // strong the hours

if (hours > = 0 && hours < =3 ) // if 0 < = h < = 3

cout << "Parking fee: 5"; //printing parking fee is 5.

else if (hours > 3 && hours < = 9)//if 3 < h < = 9

cout<<"Parking fee: "<<6*int(hours);//converting float value to int the multiplying with 6 then printing fee.

else//if 9 < h < = 24

cout<< "Parking fee: 60";// printing parking fee 60.

return 0;

}

6 0
4 years ago
Other questions:
  • J'Dean is a team lead at a car wash. He wrote a memo to the employees, explaining some upcoming promotions, but J'Dean didn't fu
    6·2 answers
  • In a formatted text file, ________ signal(s) the beginning and end of a formatting command.
    12·1 answer
  • How can a network design project benefit from the principles of itsm? How might itsm impede a network design project?
    11·1 answer
  • Plssss helpppp!!<br><br>Thanks
    11·2 answers
  • Suppose you have four 500 MB hard drives plus one 2 GB flash drive. How many GB of capacity is this overall?
    12·1 answer
  • Outputting all combinations. Output all combinations of character variables a, b, and c using this ordering abc acb bac bca cab
    7·1 answer
  • How can a user restore a message that was removed from the Deleted Items folder?
    10·1 answer
  • How can a search be narrowed to only search a particular website????
    15·1 answer
  • Consider the following method, which is intended to return the number of local maximum values in an array Local maximum values a
    6·1 answer
  • Dana is moving to a new house. She has 15 boxes for books. Each box can hold up to 22 books. Dana has 375 books. How many more b
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!