Reference no: EM131132416
A management position has opened up due to a recent retirement in the medical office where you work. You and your pregnant coworker are talking about it at lunch one day, and your coworker is very excited because she has been told several times by different senior managers that the next management position available would be hers. The next day, however, it is announced that someone with less experience, education, and time on the job will be taking over the position. Your coworker feels very strongly that it is because she is pregnant and going on maternity leave in two months. Other than two weeks of doctor-ordered bed rest for gestational diabetes, your coworker has an impeccable performance record throughout her pregnancy.
Do you feel that your coworker has a valid claim against the medical office? Why or why not?
What steps, if any, do you feel she should take next to address this situation?
How would she go about proving a violation of her rights?
Be sure to discuss a specific law or laws that may have been violated, and use facts to support your answer.
This Essay must be two pages in length (in addition to the cover page and reference list) and should use double spacing, 12-point Times New Roman font, and one -inch margins. Use APA style for citations.
Write assignment on topic ideas and opportunities
: Describe 3 trends that you've noticed, and explain how each one might generate a small business opportunity.- Make a list of at least 5 business ideas that interest you.
|
Analyze leadership style that lieutenant colonel daniel
: Analyze the leadership style that Lieutenant Colonel Daniel exhibited as he took center stage to lead this complex military operation. Provide three (3) examples of his leadership actions and behavior, assessing the pros and cons in each example y..
|
Perform an f test of the restriction
: Explain why the second model is a restricted version of the first, stating the restriction.
|
Compare symmetric encryption to asymmetric encryption
: Compare and contrast symmetric encryption to asymmetric encryption. PKI uses digital certificates to encrypt / decrypt data. Analyze the process of encrypting and decrypting data using a digital certificate.
|
How would she go about proving a violation of her rights
: Do you feel that your coworker has a valid claim against the medical office? Why or why not? What steps, if any, do you feel she should take next to address this situation?
|
How many copies should he order from the publisher
: Suppose that the Inn at Penn uses the newsvendor model to set the protection level optimally. Which of the following changes in the environment would be the best argument for lowering protection levels?
|
Analyze most commonly overlooked software development risks
: Analyze the most commonly overlooked software development risks within an organization you work for, or with which you are familiar. In your analysis, explain what these risks are and how they affect, or can affect, a software project.
|
Perform a goldfeld-quandt test for heteroscedasticity
: Sort the data set by GDP and perform a Goldfeld-Quandt test for heteroscedasticity, running regressions using the subsamples of 14 countries with the smallest and greatest GDP.
|
Is there evidence that this is a preferable specification
: Fit an earnings function using your EAEF data set, taking EARNINGS as the dependent variable and S, ASVABC, and MALE as the explanatory variables, and perform a Goldfeld-Quandt test for heteroscedasticity in the S dimension. (Remember to sort the ..
|