Can the trees be considered a bribe

Assignment Help Basic Computer Science
Reference no: EM131195919

You are in charge of awarding all PC service contracts for your employer. In recent e-mails with the company's PC service contractor, you casually exchanged ideas about home landscaping, your favorite pastime. You also mentioned that you would like to have a few Bradford pear trees in your yard. Upon returning from a vacation, you discover three mature trees in your yard, along with a thank-you note in your mailbox from the PC service contractor. You really want the trees, but you didn't mean for the contractor to buy them for you. You suspect that the contractor interpreted your e-mail comment as a hint that you wanted him to buy the trees. You also worry that the contractor still has the e-mail. If the contractor sent your boss a copy, it might look as if you were trying to solicit a bribe. Can the trees be considered a bribe? What would you do?

Reference no: EM131195919

Questions Cloud

Enterprise or equity value : When you are trying to acquire a company, do you pay more attention to enterprise or equity value?
Calculate the coefficient of correlation : Calculate the coefficient of correlation - Find the correlation coefficient and regression lines for the data.
Attention to enterprise or equity value : When you are trying to acquire a company, do you pay more attention to enterprise or equity value?
How do you handle this situation : It will be your responsibility to meet with the three people who will interview her to form an assessment and make a group decision about whether or not she will be offered the position and, if so, at what salary. How do you handle this situation?
Can the trees be considered a bribe : If the contractor sent your boss a copy, it might look as if you were trying to solicit a bribe. Can the trees be considered a bribe? What would you do?
Company cash conversion cycle : The company's accounts receivable equal $100 million and its balance sheet shows inventory equal to $125 million. The company's payables deferral period (accounts payable divided by daily purchases) is 40 days. What is the length of the company's ..
Principal role or function of the comptroller of currency : What is the principal role or function of the Comptroller of Currency? What is the principal job performed by the FDIC?
Determine the total dollar amount of profit or loss : Determine the total dollar amount of profit or loss from this futures contract based on the expectation that the Argentine peso will be worth $.42 in 1 year.
Distinguish the role as clinical or non-clinical : Focusing on the specialty for which you were admitted to South University, select an advanced nursing role to research. (It must be one offered by South University.) According to the NPSGs, distinguish the role as clinical or non-clinical and how i..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Main types of file managers

There are three main types of file managers used in different distributions of Linux. Orthodox file managers or "Commander-like" file managers have three windows (two panels and one command line window).

  What are the 5 levels of hierarchy in a db

What are the 5 levels of hierarchy in a DB

  The availability and multitude of forensic toolkits

the availability and multitude of forensic toolkits continue to increase. the last decade has witnessed the emergence

  Create a method that controls the speed

The blades should continue turning until the animation stops running or the user clicks the off button.

  Why you consider it wrong and why

Do you agree or disagree with the statement? Select a position which is close to your personal standpoint. Collect arguments supporting your position and refuting the opposite one. In every particular case, identify the idea(s) you are opposing. E..

  Implement a method replace within a client of binary search

Implement a method replace within a client of Binary Search Tree.

  Provide the ability to disable secure boot

As explained in the third e-Activity, Microsoft has provided the ability to disable Secure Boot on its x86 platform but not on its Windows 8 ARM-based systems (Windows RT).

  How the world could be recorded using three different

The student data files for this book include a ballerinas dancing Alice world, a Japanese fan dancer Alice world, and a toy soldiers marching Alice world. You will use these words for

  Set of experience knowledge structure

Set of Experience Knowledge Structure (SOEKS) is knowledge representation in an artificial system that would support discovering, adding, storing and sharing knowledge through experience in a similar way that humans DNA do. SOEKS is then later car..

  Identify and confirm proper implementation of such analytics

How does one evaluate the types of tracking beacon variables passed to the analytics platform collection servers? How do tracking beacon audits help ensure reliable data collection?

  Have no hesitation buying over the internet

List some items you would have no hesitation buying over the Internet, some items you might want to think about a bit before buying and some items you would never consider buying over the Internet. Justify you reasons in each case.

  Display the total salary paid for each department

Write the data to the file. When the user selects this option, dump the information in each array into a separate file. Do not write to the file until the arrays are full.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd