If an angry person called and demanded to speak with the executive you support, who is currently unavailable, how would you handle it?

Answers

Answer 1

Answer: be nice no matter how mean or rude the person is.

Explanation: because if you’re not you can get in big trouble or fired.

Answer 2

Answer:

remain  calm during the conversation


Related Questions

Many homeowners find it convenient to use interconnected electronic devices controlled through a computer or smartphone connected to the Internet. However, these interconnected devices can lead to some issues. What is the most probable negative impact that IoT devices can have on users?

Answers

Answer:

The most probable negative impact that IoT devices can have on users is the increase vulnerability of information technology cybersecurity, being that access can be gained into the system through another device connected to an IoT device from which it is theoretically possible to launch malicious computer codes, using both old and present day hacking technologies, due to the different securities, categories and systems of devices connected to the IoT

Explanation:

The negative impacts of Internet of Things IoT devices on users are

1) Loss of privacy 2) Network complexity increase 3) Increase in the dependence on technology 4) Increased unemployment, 5) Lack of compatibility between devices

What is office technology?​

Answers

Answer:

Explanation:

Office Technology is the study of a wide range of subjects related to careers in the modern office of today. This program provides the training necessary to perform successfully in the many and varied clerical, secretarial, and office administrative positions.

what is the example of HTML?​

Answers

Answer:

For example, content could be structured within a set of paragraphs, a list of bulleted points, or using images and data table

What is the positional weigh of the digit 7 in the octal number 7642 ?​

Answers

Answer:

111 is the answer..i hope it helps

Assume there are two variables, k and m, each already assigned a positive integer value and further assume that k's value is smaller than m's. Write the code necessary to compute the number of pertect squares between k and m. (A perfect square is an integer like 9, 16, 25, 36 that is equal to the square ot another integer (in this case 393, 4*4, 5*5, 6*6 respectively). Assign the number you compute to the variable q. For example, if k and m nad the values 10 and 40 respectively, you would assign 3 to q because between 10 and 40 there are these perfect squares: 16, 25, and 36.

Answers

Answer:

Lets us take k, m = 10, 40

q = 0

i = k

while i <= m:

   if int(i*0.5)*2 == i:

       q += 1

   i += 1

Who said the following, and what does it mean? Conceit, more rich in matter than in words, Brags of his substance, not of ornament. They are but beggars that can count their worth; But my true love is grown to such excess I cannot sum up half my sum of wealth. (II. vi. 33-37) Juliet; she is saying that she doesn't care about money. Lady Capulet; she is reminding Juliet how lucky she is to be marrying Paris. Romeo; he is saying that true understanding has made him realize how very lucky he is to be marrying Juliet. Juliet; she is saying that true understanding is enriched by reality and worth more than outward appearances.

Answers

Answer: Juliet; she is saying that true understanding is enriched by reality and worth more than outward appearances.

Explanation:

Juliet was talking to Romeo in this instance and trying to tell him that it was easy to speak words but that for those words to be properly understood, action must follow them.

In other words she was telling him that to truly understand something, actions must back it up. She then goes on to say to him that the love she has is so much that it has made her feel more wealthy.

How would you approach a friend that you suspect is addicted to technology?

Answers

Ask them to go out on a picnic or something that doesn’t involve technology and if they bring up excuses, tell them that it’s not healthy to be on their phones or other devices all the time.

You would approach a friend that you suspect is addicted to technology in numerous ways. Some of them are as follows:

Guide that individual towards tour and travel which can not include technology. Advise him to give tips on meditation and its benefits.Plan a regular schedule for exercise. Try to give the advantages of being familiar with family members.

What are the disadvantages of technology?

The disadvantages of technologies are as follows:

It stimulates social isolation and loneliness.Complete waste of time.It builds negative impacts on young students. Gradual degradation of mental health and memory.

According to the context of this question, technology addiction becomes normal in the present scenario. So, in order to prevent yourself and your family members from these traps follow some well-determined and strict routine and try to spend time with the family members, games that do not involve technology, meditation, exercise, etc.

Therefore, you would approach a friend that you suspect is addicted to technology in numerous ways. Some of them are well mentioned above.

To learn more about Technology addiction, refer to the link:

https://brainly.com/question/9552314

#SPJ5

write the step by approach to re saving a document using the save as option

Answers

Press save as and then choose your location to save it and then click save

An end-user license agreement protects _____.

Answers

End User License Agreements are important for protecting the rights of the business owner/licensor and critical for setting the rules of use and managing the expectations of the end-user.

Answer: both the owner and the purchaser of the software

Explanation:

An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the company capture curate and consumer customer information?

Answers

Answer:

Data and Insights

Explanation:

In an enterprise platform, the data and insights are considered as one of the important aspect of any enterprise. It helps in better understanding of the customer so that the enterprise successfully offers best services to the customers.

Data are basically the information that enterprise can gather from the customers and insights are defined by gaining knowledge by analyzing these data so that the company can provide best customer service and it also helps them to capture curate as well as consumer information.

Thus the answer is 'data and insights'.

Anyone know how to make website (PROFESSIONAL)

Answers

Answer:I know how to make a professional website

Explanation:

what allows an individual or company to share a post with an audience however they are designed to be used with mobile devices and limit the size of posts

Answers

Answer:

E-mail

Explanation:

The sending of messages via the Internet is known as e-mail. It is one of the most often utilised functionalities for sending text, files, pictures, and other attachments across a communications network.

A podcast lets a person or corporation to share articles with an audience, but it is geared for usage on mobile devices and has a capacity restriction.

donde veo haikyuu en español sin lag ni virus :C (la segunda, tercera y cuarta temporada)

Answers

Answer:

keep in English language

Explanation:

keep in English

4. Calculate the standard deviation for the following data set: Foundations of Technology Engineering byDesi OITEEA . . Data Set = 4, 14, 6, 2, 7, 12 217 ,​

Answers

Answer:

[tex]\sigma_x = 5.68[/tex]

Explanation:

Given

[tex]x = 4, 14, 6, 2, 7, 12 2,17[/tex]

Required

The standard deviation

First, calculate the mean

[tex]\bar x =\frac{\sum x}{n}[/tex]

So, we have:

[tex]\bar x = \frac{4+ 14+ 6+ 2+ 7+ 12 +2+17}{8}[/tex]

[tex]\bar x = \frac{64}{8}[/tex]

[tex]\bar x = 8[/tex]

The standard deviation is:

[tex]\sigma_x = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]

So, we have:

[tex]\sigma_x = \sqrt{\frac{(4 - 8)^2+ (14 - 8)^2+ (6 - 8)^2+ (2 - 8)^2+ (7 - 8)^2+ (12 - 8)^2+ (2 - 8)^2+ (17 - 8)^2}{8-1}}[/tex]

[tex]\sigma_x = \sqrt{\frac{226}{7}}[/tex]

[tex]\sigma_x = \sqrt{32.2857}[/tex]

[tex]\sigma_x = 5.68[/tex]

Distinguish between afax and a telephone call (5points)​

Answers

Answer:
A fax is an exact copy of a document made by electronic scanning where as a telephone call is a communication or conversation via a telephone

Express your opinion on whether a successful business analyst can be a good programmer. support your answers with reason

Answers

I think that a successful business analyst could be a good programmer because if they had the write training and experience they could learn about that field of work and become good at programming

The number of swappings needed to sort the number 8, 22, 7, 9, 31 in ascending order, using bubble sort is

Answers

Answer:

3

Explanation:

swap the 7 with the 22

swap the 7 with the 8

swap the 9 with the 22

describe how it is necessary to design documents, files, forms/inputs, reports/outputs and validation​

Answers

Answer:

Explanation:

Good organization, complete information and clear writing are the most effective ways to design a document.

I hope this helps

outline the steps involved in signing into your account​

Answers

You put in your username or email and then you put in your password! It’s as simple as that :D

Shelby wants to move “ExpirationDate” to the top of the datasheet. What should she do?

Answers

Select row for "ExpirationDate", click the mouse and drag the field until the blue line appears above "Scent," and release the mouse button.

Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and she must immediately pay $500 to have it renewed before control of the computer will be returned to her. What type of malware has infected her computer

Answers

Answer:

Blocking ransomware

Explanation:

A ransomware is a malware that acts by encrypting the files of a victim after which the attacker demands for a ransom payment to be made by the victim before access is restored through the provision of a key to decrypt the encrypted files

There are different types of ransomware such as blockers, wipers and cryptors

A blocker ransomware is one that blocks access to the files stored on a computer or device by encrypting them and usually displaying a demand for payment message that comes up in front of the all opened windows

In large organizations, there is a formal business function that includes developing an information policy, planning for data, overseeing logical database design and data dictionary development, and monitoring how information systems specialists and end user groups use data. __________ is responsible for information policy, as well as for data planning, data dictionary development, and monitoring data usage in the firm.

Answers

Answer:

Data administration.

Explanation:

Data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Hence, a database management system (DBMS) is a system that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.

Data administration is a strategic process that is typically responsible for establishing information policy, data planning, data dictionary development, and monitoring data usage in the firm.

How can computer be beneficial in agriculture and tourism​

Answers

The production capacity in farming and animal husbandry has increase due to use of computer in agriculture field . There are less losses due to work are monitored by computer. By using computer in traditional field like agricultural field we can increase the productivity and minimize the error happen.

What is the role of memory in a computer​

Answers

Answer:

Computer random access memory (RAM) is one of the most important components in determining your system's performance. RAM gives applications a place to store and access data on a short-term basis. It stores the information your computer is actively using so that it can be accessed quickly.

is computers takes lots of time to do any mathematical calculations.​

Answers

Answer:

I think the answer is a computer take lost of time to do any mathematical calculations because problem in the book or questions.

Hope this helps you ^^

How do you connect asp.Net mvc web application in visual studio 2013 to a database created in mysql query browser

Answers

Solution :

Asp.Net is a programming language of Microsoft. It stands for  Active Server Pages. It was developed by the giant, Microsoft which provides and helps the programmers to build a dynamic web sites, services and applications.

Using the asp.Net we can create a web application which provides interface to the existing database.

Creating an ASP.NET web application :

-- We create a new project in the Visual Studio in the same solution or the new solution and then select asp.NET web app template.

-- Name this project as ContosoSite.

-- Click OK.

-- Now in the project window of a new asp.Net project window, we select the MVC template.

-- Clear the Host in Cloud option as of now as we can deploy the application to the cloud later on.

-- Click ok for creating the application.

What is thesql command to list the total sales by customer , month , and product, with subtotals by customer and by month and a grand total for all product sales

Answers

Answer:

The answer is below

Explanation:

The the sql command to list the total sales by customer , month , and product, with subtotals by customer and by month and a grand total for all product sales is:

SELECT S.CUS_CODE, T.TM_MONTH, S.P_CODE,

SUM(S.SALE_UNITS*S.SALE_PRICE) AS "TOTSALES"

FROM DWDAYSALESFACT AS S INNER JOIN DWTIME AS T ON S.TM_ID =

T.TM_ID

GROUP BY S.CUS_CODE,T.TM_MONTH,S.P_CODE WITH ROLLUP;

You are concerned that if a private key is lost, all documents encrypted using your private key will be inaccessible. Which service should you use to solve this problem

Answers

Answer:

Key escrow.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

Hence, if a private key is lost, all documents encrypted using that private key will be inaccessible to the users. Thus, the service that can be used to solve this problem is a key escrow because the cryptographic (private) keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

A finite set of values along with set of rules for permissible operations is called ______


Data type

Class

Methods

Answers

Answer(data type) is your answer

Data type is the correct answer

A host is on the 192.168.146.0 network that has a subnet mask of 255.255.255.0. The binary value of the host portion is 11010101. What is the decimal value of the host portion of the address?

Answers

Answer:

213

Explanation:

The given parameters are;

The network on which the host is on = 192.168.146.0

The subnet mast = 255.255.255.0

The binary value of the host portion = 11010101

To convert the binary value to decimal value, we proceed by multiplying each of the digits of the binary value by the corresponding power of 2, from the left to right, starting from a power of 0, and sum the result, as follows;

(11010101)₂ = (1×2⁷ + 1×2⁶ + 0×2⁵ + 1×2⁴ + 0×2³ + 1×2² + 0×2¹ + 1×2⁰)₁₀

1×2⁷+1×2⁶+0×2⁵+1×2⁴+0×2³+1×2²+0×2¹+1×2⁰= 128+64+0+16+4+1 = 213

∴ (11010101)₂ = (213)₁₀

The decimal value of 11010101 is 213.

Other Questions
Find the graph of the inequality ys-=x+ 1. A source must be cited When an employer prevents workers from workers entering The primary purpose of using short-term budgets is to: Multiple choice question. keep employees uncomfortable about missing budgetary projections evaluate performance and take necessary corrective action plan for plant asset purchases and disposals fghjklfghjkldfghjkldfghjkl;fghjklf... examples of population composition The government can stop a public protest of its policies if____(A) The demonstrators face counter demonstrators (B) The protest is on public property (C) The protest is unpopular (D) The demonstrators endanger public safety Suppose the town of Falls Valley has a mosquito problem. After a bad summer, the town accountants explain that the marginal cost of providing one more treatment for mosquito control is $100,000. The town should provide the additional mosquito control only if the marginal: Group of answer choices social cost of mosquito control is more than $100,000. benefit for any individual citizen is at least $100,000. social cost of mosquito control is less than $100,000. benefits for all individual citizens add up to at least $100,000. John and Diana have been married for several years and share a goal of owning a 2nd home on the New Jersey shore in 8 years. They decide to review their financial expenditures monthly to evaluate steps they can take to better save their earnings. Which step of personal financial goals are they most in Tom and Jerry make separate investments at the same time. Tom invests $2000 at an annual interest rate of 2% compounded continuously. Jerry invests $1800 at an annual rate of 2.5% compounded monthly.a.) Who has the most money after 15 years? Clearly show all work to support your answer. b.) How long will it take for Toms investment to triple in value? A student recorded the weight of potatoes she used for a science fair project. Readthe data. For each potato, draw an X above the line plot to show its weight.BE1Weight in 2 / 4 1 2 3 4 2APotato3DFGH24pounds1 potato = x4.4O24.4What is the total weight of all the potatoes? Give your answer in simplest form.3What is the difference in weight between potatoes that weigh 4 pound and those thatweigh pound? Give your answer in simplest form. John/ drive/ cars/ for a living. I/ do/ research/ at the moment. Which of these is NOT an art form of Melanesia?MasksPaintingBark clothPotteryMat and basket weaving What is the quantity of carbon-14 in a bone after 17,190 years if the initial mass of C-14 is 0.300 grams and the half-life is 5,730 years?A. 0.038 gB. 0.093 gC. 0.281 gD. 0.412 g Geoffrey is looking for a safe investment for $3,000 he received as a bonus. He is looking for an investment that will also help him deal with the effects of inflation. Which of the following options would you recommend that Geoffrey invest in?a. Series EE bonds. b. Series I bonds. c. Commercial paper. d. Junk bonds. Describe the relationship between Bev and Ezze. Please HELPPP The needle in the following diagram rotates around a fixed point in the middle. Based on the information given, what way will the needle rotate when the current is applied? please answer b and check if the others are correct too. Consider the following titration for these three questions:1.00 L of 2.00 M HCl is titrated with 2.00 M NaOH.a. How many moles of acid are equal to one equivalent in this titration?b. How many moles of HCl are found in solution at the halfway point of the titration?c. How many liters of base will be needed to reach the equivalence point of the titration? Is the word Autotroph rightly used to describe animals based on nutrition? Justify