What function of language did your interactions illustrate

Assignment Help Management Information Sys
Reference no: EM131138318

Computer Mediated Communication

For most of us, computer-mediated-communication (CMC) is a big part of our daily lives. For the purpose of this assignment, we will include your cell phone as a type of "computer." In this assignment, you will reflect on your CMC.

First, read Chapter 4 in Bevan and Sole. Next, monitor your cell phone and/or computer-use during the course of a single day. Please download and save the CMC chart and make a note each time you check an email, text, play a game, or even check the time. Keep track of all of your personal and work-based communication activities through the course of a day and write everything you did on the provided chart. Keep track of the type of communication, length of time of your engagement, and the roles of both verbal and nonverbal communication in the interactions.

As you take notes on your chart, ask yourself:

Was there any implied meaning in the text of your writing? Did you ever use emoticons or use all caps?

In your written messages, how do you try to convey tone without nonverbal cues?

In your spoken messages, how do you think you could have been clearer if those messages had been written?

What connections can you make between your activities and the various functions of language and non-verbal communication discussed in

Bevan and Sole (Sections 4.1 and 4.2)? Please list and describe at least one function of language and one function of nonverbal communication and show how those functions are demonstrated in your day of interactions.

Sample Notes

Work email - used emoticons and exclamation points to lighten the tone; careful with formal language and typos as this can be read that as careless or incompetent; saw responses to me with exclamation points and emoticons (nonverbal); like in table 4.7 in our text, I noticed I tried to clarify I understood others by saying things like "Are you saying that ...?" If I were with them, I'd read body language instead.

When you write your paper, focus on specific interactions like the example used above or comment on general-use patterns. Then, based on what you have learned in Bevan and Sole, answer the following questions:

How much time in a single day do you communicate with your phone, computer, or both? Why does this matter?

Why should we pay special attention to our CMC?

What function of nonverbal communication did your interactions illustrate? How important was nonverbal communication in all of your computer-mediated interactions? Or, how did the lack of nonverbal communication allow you to think about a function of nonverbal communication?

What function of language did your interactions illustrate? How important was verbal communication?

What advice from Bevan and Sole could be used to improve your computer-mediated-communication?

Do not worry if you end up missing a few of your interactions. However, the more details you collect, the better your evidence will be to support your points. If it turns out you do not do much computer-mediated-communication, focus on the costs or benefits of primarily relying on verbal (and/or spoken) communication.

Copy and paste your complete CMC chart to the end of your paper.

The paper

Must be two to three double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center.

Must use the course text to support points.
Must document all sources in APA style as outlined in the Ashford Writing Center.
Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.

Reference no: EM131138318

Questions Cloud

How many pure strategies does the producer have : Draw a possible game tree representing the interaction between a typical producer selected at random and a distributor in the industry.
Analyze and present reasons for the variances : Standard Costing - Please review the results below, analyze & present reasons for the variances
Describe the scope and analyze how to control the scope : Write an eight to ten (7-8) page original business requirements document for the project plan. Describe the project including the following: Describe the scope and analyze how to control the scope. Identify possible risks, constraints, and assumpti..
Why is inmate custody important in a correctional facility : Why is inmate custody and control important in a correctional facility? Identify how the following methods are used to maintain inmate custody and control in correctional facilities.
What function of language did your interactions illustrate : What function of nonverbal communication did your interactions illustrate? How important was nonverbal communication in all of your computer-mediated interactions? Or, how did the lack of nonverbal communication allow you to think about a function..
Smooth flow of funds from household savers to corporate user : 1. Explain how economic transactions between household savers of funds and corporate users of funds would occur in a world without financial institutions.2. Identify and explain the two functions FIs perform that would enable the smooth flow of funds..
Explain how society manage its scarce resources and benefits : How society manages its scarce resources and benefits from economic interdependence. Why the demand curve slopes downward and the supply curve slopes upward.
Compare and interpret the expected proots of the monopolist : What is the expected proÖt maximizing entry fee F and price p per unit? - what level of q should the monopolist choose if it wants tomaximize expected proÖt by offering the product for some r?
Analyze the stages of the organizational buying process : Recall a situation in which you sought health care of some type (not including care for an injury or illness). Determine if your situation followed the five steps of the buying decision model and what role marketing may have played in your seeking..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Question about replacement chaincotner clothes inc is

question about replacement chaincotner clothes inc. is considering the replacement of its old fully depreciated

  What measurable benefits will umuc haircuts business realize

What opportunities are being missed when each little area (scheduling, supply management, marketing, and others) has its own "stove piped" data? (Provide some examples.)

  Evaluate the two major information delivery methods

Evaluate the two major information delivery methods in mobile commerce - data security of information transmitted in the wireless network

  Determine the first two lines of new file created by code

Determine the first two lines of the new file created by the code below. This exercise refers to the file Justices.txt that contains data about the Supreme Court justices, past and present

  Prepare a proposal for rfp project

Prepare a proposal for "RFP Project" and need to develop or explain more the "NYSCE" file according to file Design Activities- Review the system requirements, determine system development options and create the Systems Requirement Document

  Determining the competitive value of information technology

Identify three factors to consider in determining the competitive value of information technology. Justify the selected factors. Of the factors selected, determine if each factor is applicable to all businesses and industries, and explain why or why ..

  Conducting audits for various businesses

Imagine you are working as an IT auditor. Identify the three (3) best practices you believe would be most useful when conducting audits for various businesses. Justify your choices

  Information security program

Describe the difference between corporate investigations and law enforcement investigations and determine why corporate investigations are an integral part of an information security program.

  Specify security functional and nonfunctional requirements

"Software Dependability and Security" Please respond to the following: Specify security functional and nonfunctional requirements that you would define to mitigate the security threats in your selected scenarios

  Compare and contrast hids and nids

Intrusion Detection Systems (IDS), which can be categorized as Host IDS (HIDS) and Network IDS (NIDS), is a means of providing real-time monitoring. Compare and contrast HIDS and NIDS, and provide at least one (1) example identifying when one (1) ..

  Internal controls and risk managementsmith a certified

internal controls and risk managementsmith a certified public accounting firm was engaged to audit the financial

  Analyze the fundamental impact of it architecture

Analyze the fundamental impact of IT architecture or enterprise architecture on information management for your chosen company or industry. Determine if IT architecture impacts the effectiveness or efficiency of information management and vice ver..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd