A list of netiquette rules ____ available for all corporate e-mail users
A) is
B) are
C) were
A
You might also like to view...
The trait approach focuses on ______.
A. follower–leader interaction B. role of the leader C. role of the follower D. role of the organization
All of the following techniques are used to validate electronic data interchange transactions except
a. value added networks can compare passwords to a valid customer file before message transmission b. prior to converting the message, the translation software of the receiving company can compare the password against a validation file in the firm's database c. the recipient's application software can validate the password prior to processing d. the recipient's application software can validate the password after the transaction has been processed
While e-portfolios and employment videos are helpful in communicating an applicant's qualifications and abilities, their use may also
a. enable the potential employer to stereotype and discriminate against the applicant. b. decrease attention to the "soft skills" of the applicant. c. encourage the potential employer to focus on your physical characteristics d. lead to all of the above.
Which theory below suggests that human performance is directed by conscious goals and intentions?
a. Goal setting theory b. Alderfer’s ERG Theory c. Herzberg’s two-factor theory d. McClelland’s acquired needs theory