What communication is appropriate for each party

Assignment Help Basic Computer Science
Reference no: EM13991183

Conveying negative information is one of the most difficult tasks you will encounter in business communication. To receive a favorable response, focus on appropriate word choice, tone, and organization-especially how much information to convey to each person and how to layer negative content. Providing the best possible service to internal and external customers hinges on effective communication.

Note: Using templates or sample documents to help you write e-mails, memos, and letters may be helpful for inexperienced writers; however, please be sure to customize the communication so that the document does not look like a form letter to your readers.

After reading the following scenario, determine how to communicate its negative information appropriately to your supervisor or manager, to the members of your project team, and to your travel agent in the scenario.

Scenario:

As a project manager, you are looking forward to completing your project and taking a European vacation with the bonus you and your team are looking forward to receiving. Shortly before bonuses are expected, you realize your team missed the financial goal for the quarter. As a result, you and your team will not receive bonuses. You must notify your manager about the missed goal and your team members about both the missed goal and the loss of the bonuses. And you must also inform your travel agent you are unable to take the trip.

Consider how much information and what communication is appropriate for each party, based on information in your text.

Review the sample formatting for memos, emails, and business letters in Modules 9, 10, 11. Also review Netiquette considerations in Module 13.

Write a letter to one party, a memo to one party, and an e-mail to one party. Each communication must be a maximum of 250 words. Be attentive to appropriate tone, level of detail, and document formatting for each different audience. Use standard formatting for your documents, including headings, body layouts, and closings.

Use appropriate grammar, spelling, and style for each type of communication.

Ensure you have followed the guidelines for communicating effectively. Perform an extra editing check, reading specifically for this purpose.

Post the messages as three separate MS Word documents.

Module 9

Formats for Letters and Memos

LO 9-1 Apply principles for correct letter formats.

LO 9-2 Apply strategies for professional image creation with documents and beyond.

LO 9-3 Recognize courtesy titles for correspondence.

LO 9-4 Apply principles for correct memo formats.

Module Overview

Some students already know that letters typically go to people outside of an organization, while memos are preferred for internal documents. However, the actual formats for these documents may be less apparent to them. Format refers to the parts of a document and the way they are arranged on the page (PP 9-3).

Formats for e-mail are still evolving, but the standards in this module are applicable for many e-mail systems.

Teaching Tip: Many colleges provide e-mail at little or no cost to students, and free e-mail is available from various Web companies. However, if you school has a standardized e-mail system, use it as the basis for instruction in your class. Encourage students to learn the system, working through its quirks and style preferences. If it is a widely used system, you might adapt the information here to using it properly.J

Like anything in business, organizational culture and discourse community affect the choice of format for a document. Therefore, the standards expressed in this module may be different than those in individual organizations. Nonetheless, students should learn and use these formats for your course-establishing format standards will help students understand the workings of any document format, making it easier for them to adapt to new ones.

Teaching Tip: Follow the guidelines in this book for all class documents you submit to your students and expect students to do the same for documents they submit to you.J

In-Class Exercise: Have students collect examples of what they consider documents formatted well. Let them compare what they've found to the principles in this module. How do they overlap? Where they differ, how might the document look if book principles were applied? Can even a good document format be made better? Let students share their findings with the class.!

What's in This Supplement

This supplement is organized around the major questions posed in Module 9. It covers

Part 1: Key Lecture Points, Teaching Tips, and In-Class Exercises Page 126

Part 2: Answers to Textbook Assignments Page 141

PowerPoint presentations can be found at our Web page at www.mhhe.com/bcs6e.

Questions (with answers) suitable for quizzes are in the Instructor's Test Bank. For student practice quizzes with answers, see our Web page.

Reference no: EM13991183

Questions Cloud

What is the electron speed : IP Laboratory measurements show that an electron traveled 3.50 cm in a time of 0.210ns . What is the electron's speed?
The uniform arrangement of the backbone carbonyl : Three Questions: The uniform arrangement of the backbone carbonyl oxygens and amide nitrogens in an α helix gives the helix a net dipole, so that it carries a partial positive charge at the amino end and a partial negative charge at the carboxyl end...
Treatment with the us tax system treatment : Explain the Australian tax treatment of fringe benefits. Choose two of the fringe benefits listed in the publication and compare their treatment with the U.S. tax system treatment.
How office scheduling and hours should be constructed : A new group of primary care physicians have decided to locate in a suburb of Washington, D.C. After conducting some primary market research on the area, the group's research firm has characterized the community as comprising Boomers, Gen-Xers, and a ..
What communication is appropriate for each party : After reading the following scenario, determine how to communicate its negative information appropriately to your supervisor or manager, to the members of your project team, and to your travel agent in the scenario.
Sodium ions and away from the chloride ions : Two Questions: What, if anything, is wrong with the following statement: "When NaCl is dissolved in water, the water molecules closest to the ions will tend to orient themselves so that their oxygen atoms point toward the sodium ions and away from th..
What is the noise equivalent power of the detector : With an irradiance of 0.001W/cm2 incident on a detector of area 0.5 cm 2 and with a bandwidth of 2 Hz, the ratio of the noise voltage to the signal voltage is 10. What is the noise equivalent power of the detector?
How economic factors affect inequality in achievement : The superintendent of a Texas school district wishes to better understand how economic factors affect inequality in academic achievement across the district.
What were some of the arguments centered on slavery : What were some of the arguments centered on slavery and territorial expansion? How did the Compromise of 1850 fail to solve them?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Design the environment for the system

Develop a design plan and schedule detailing your plans for the next 4 weeks in order to deliver the tasks specified. This should cover what design decisions must be made and who should make them; what tasks must be performed and in what order;

  Prove the identity of the following boolean equations

Prove the identity of the following Boolean equations, using algebraic manipulation: AB + AB' +A'B' = A + 'B 2). Reduce the following Boolean expression to a minimum number of literals: A' B( D' +C' D) + B(A + A'CD) NEED HELP WITH THIS TWO QUESTIO..

  Design static method below to find and return complex number

Given a "Complex" class with all the standard methods for complex numbers, design the static method below to find and return the smallest complex number.

  Powerpoint presentation on job safety analysis

PowerPoint Presentation on Job safety analysis

  Based on unix systems security model

Based on UNIX systems security model, the Linux security model is as rigid as the UNIX security model--and sometimes even more robust. In Linux, every file is owned by a user and a group user. Those users that are not the user owner and don't belong ..

  What type of damage these computer infections can do to data

Virus, Trojan, Worm, Rootkit, Describe how each applies to the realm of data communication. Also, discuss what type of damage these computer infections can do to data in a computer.

  Describe one real or future (even imaginary) iot

Describe one real or future (even imaginary) IoT (or CPS - Cyber Physical System) usecase. Provide details on the system(s) requirements from user(s)/actor(s) perspective.

  Write and test a version of selection sort for linked lists

Write and test a version of selection sort for linked lists. Write a program to test insertion sort for linked lists.

  C++ programming

create a text-based, menu-driven program that allows the user to choose whether to add, subtract, multiply or divide two numbers. The program should then input two double values from the use, perform the appropriate calculation, and display the re..

  A catastrophic server crash at andersen & sons

A catastrophic server crash at Andersen & Sons,

  Steps necessary for improving and maintaining relations

Describe the steps necessary for improving and maintaining relations with other business units - Can you provide the answer with reference to basic computer science?

  Whats the difference between public, private and protected

What's the difference between public, private and protected?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd