A contractor speaking to a potential client

Assignment Help Basic Computer Science
Reference no: EM13824606

  1. 1) How would you, as a contractor speaking to a potential client, handle this situation? Often times you can explain something to someone and they still not really understand. When a potential client asks a question such as this, they want to understand how they are going to be putting their money to use. Would you explain it technically first and then use an analogy, or go straight for the analogy? Why?
  2. 2) Respond to your classmates by assuming the role of the potential client. Critically review their explanation and ask for clarification, details, or examples. Provide positive and constructive feedback and identify points that you agree or disagree with.

In my career as a Cisco VoIP engineer, I find myself in this situation more often then I would care to honestly. It tends to happen on a daily basis, multiple times a day. I generally try to explain things technically first and then go to an analogy, but I often find myself going back to the technical aspect of the question after the analogy as well. For example, right now I am working extensively with UCCX (Unified Contact Center Express), which I think is a very logical process all together, but it can be made very difficult depending on call routing and how the scripts have been written. When I explain this to people I try to find something that I can relate it to in order to help them better understand it. When it comes to the call routing piece I usually try to relate it to reading a map or choosing a route via GPS. You can choose to go the shortest route, but it may not always be the best route. When it comes to the scripting piece I often use the process of changing a tire on a car. Explaining that there are certain things you need to accomplish the task at hand successfully.

 

 

Reference no: EM13824606

Questions Cloud

Numerous types of wireless attacks : There are numerous types of wireless attacks that are covered in the text. Below is a list of the main attacks that are discussed. Let's discuss each attack by choosing two to discuss. When choosing which type to discuss, make sure it has not been ch..
Describe and evaluate the numerous theories and models : Describe and evaluate the numerous theories, models, and approaches you have identified in your course readings, case analyses.
Persistent behavior problems and trouble : Terri Key's son Taylor was diagnosed with Tourette's syndrome, obsessive compulsive disorder, and ADH disorder.  Terri was dissatisfied with Taylor's experience in public school and enrolled him at St. Michael's Catholic School. He was forced to w..
Evaluating the performance of the crew : Ed Koehler started Great Southern Furniture five years ago to assemble prefabricated bedroom furniture for large hotel chains. Required: Write a report evaluating the performance of the crew at the Hyatt in Tampa
A contractor speaking to a potential client : 1) How would you, as a contractor speaking to a potential client, handle this situation? Often times you can explain something to someone and they still not really understand. When a potential client asks a question such as this, they want to underst..
Time driven activity based costing : Time Driven Activity Based Costing
Describe the 3-level ansi-sparc architecture : Describe the 3-level ANSI-SPARC architecture and discuss how the use of this will promote data independence to save time in the long run. Define Data Independence. What is meant by 3-level architecture and is this the same as the 3-level ANSI SPARC a..
Why do you think bambara uses the characterization technique : Bambara's characters use rather coarse language throughout the story. Why do you think Bambara uses this characterization technique? How would the story be different if the language was "cleaner?"
Prepare a table that indicates the financial disposition : Required: Prepare a table that indicates the financial disposition of the historical cost of the blue ink purchased in June. (That is, account for the $385.20 blue ink purchase.)

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Benefit from implementing locking methods

Describe how locks could be used in order to qualify data transactions and enhance concurrency control. Suggest at least two business scenarios that would benefit from implementing locking methods.

  Responsibility to maintain ethical standard in department

Do managers have a responsibility to maintain an ethical standard within a department? If so, how is the expected ethical standard established? How is it documented? How is compliance measured?

  Prepare the interface which has single method decode

Prepare the interface MessageDecoder which has single method decode(String cipherText) where cipherText is the message to be decoded.

  The human resources server to the payroll server

The human resources server to the payroll server?

  Traditional training methods

When we think of traditional training methods, we automatically think of a classroom. Think about your best classroom-based learning experience and list the things that made it such a good experience.

  What strategic advantage can continental derive

What strategic advantage can Continental derive from the real-time system as opposed to a traditional information system?

  Purpose a workshop is to become familiar with the creation

The purpose of this workshop is to become familiar with the creation, search, and modification of B+-trees

  Function that uses a switch statement

To locate nearest numbered cross street for a given avenue address, the following algorithm can be used: cancel last diget of the address, divide by two,

  Write instructions to move value of register and add them

Write instructions to move value 34H into register A and value 3FH into register B, then add them together. Where is the result

  Critique website that is different to rest of our friends

Web devolving assignment - Critique a website that is different to the rest of our friends-classmates.

  What are some internal and external factors

Cite at least two successful and two unsuccessful examples of the use of IS/IT for gaining or enhancing competitive advantages.

  Describe how you would apply slide transitions to your

instructions your responses should demonstrate your understanding of the course content and your analysis and critical

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd