Question

In: Operations Management

Assume you are the sender in a hypothetical communication, what characteristics of the receiver, message, and...

Assume you are the sender in a hypothetical communication, what characteristics of the receiver, message, and level/type of noise would impact your decisions related to medium of the message. In what circumstances would you use written communication, oral communication, or both? Which of remaining three components (receiver, message, and noise) do is typically most important when you decide the specific medium (conversation, speech, phone call, video conference, letter, memo, email, etc.) you will use to communicate?

Solutions

Expert Solution

The following characteristics would affect the choice of medium:

- The listening ability of the receiver i.e. how good or bad the receiver is.

- The accessibility to infrastructure i.e. internet, telephone etc.

- The language that the receiver understands.

- How long or critical the message is to the users.

- If the noise is less or more and can it be reduced to a level where message can be easily transferred.

Written communication would be used when information has to be documented and there are less chances of discussions. The oral communication would be used wherein it is mandatory and obligatory to personally explain the meaning of the message so that the audience understands exactly what the sender wants them to and there is no confusion.

Message holds the utmost importance that is what is the type of message we are trying to convey and how important or critical the message is to the sender as well as receiver.


Related Solutions

Successful communication relies on a positive relationship between the sender of a message and the receiver....
Successful communication relies on a positive relationship between the sender of a message and the receiver. The response to your message depends on your credibility, which is based on how reliable you are and how much trust you evoke in others. Establishing credibility is a critical step in building business relationships. Respond to the following: Reflect on how you develop and maintain credibility in your workplace. Explain the importance of establishing credibility for business professionals. How does a poorly written...
Explain various communication channels available between the sender and receiver? Further, elaborate how these communication channel...
Explain various communication channels available between the sender and receiver? Further, elaborate how these communication channel influence the message?
Suppose both the sender and receiver are in the same local area network. If the sender...
Suppose both the sender and receiver are in the same local area network. If the sender has the receiver's IP address only, but not the MAC address, how does ARP (Address Resolution Protocol) find out the receiver's MAC address?
Assume both the TFTP sender and the TFTP receiver implement retransmit-on-timeout but not retransmit-on-duplicate. Outline a...
Assume both the TFTP sender and the TFTP receiver implement retransmit-on-timeout but not retransmit-on-duplicate. Outline a specific TFTP scenario in which the TFTP receiver of 16.4.2 TFTP States sets a socket timeout interval but never encounters a “hard” timeout – that is, a SocketTimeoutException – and yet must timeout and retransmit. Hint: arrange so the sender regularly times out and retransmits some packet, at an interval less than the receiver’s SocketTimeoutException time, but it is not the packet the receiver...
Have you or someone you know experienced negative results due to self-disclosure (as sender or receiver)?...
Have you or someone you know experienced negative results due to self-disclosure (as sender or receiver)? If so, what could have been altered in the decisions of what, where, when, or how to disclose that may have improved the situation?
When encrypting data, we must ensure that both the sender and the receiver are in possession...
When encrypting data, we must ensure that both the sender and the receiver are in possession of the correct keys to allow them to either encrypt or decrypt the messages successfully. There are two main types of encryption defined by the number of different keys used. (10 marks total) i. Name each type and briefly explain how they are different? ii. Name one popular algorithm used for each type of encryption. iii. A user would like to send a long,...
A sender wants to transmit 16 frames in data link layer to a receiver, and every...
A sender wants to transmit 16 frames in data link layer to a receiver, and every 4th transmission is lost. How many total transmissions are required if A) Go-back-3 flow control is used? B) Selective repeat is used? C) Stop-and-wait is used?
• Present a scenario where the sender is not clear in delivering a message. • Present...
• Present a scenario where the sender is not clear in delivering a message. • Present a scenario where the receiver has decoded a message incorrectly. • Why are rumors detrimental to a company? • Why are rumors especially harmful in the media? What are ways of eliminating and preventing rumors in an organization? • Listening skills are essential to a good manager. Describe a scenario when you felt you were not heard and it affected the communication process. •...
What is data communication? What are the characteristics of data communication?
What is data communication? What are the characteristics of data communication?
1.What does Drucker mean when he suggests thatcommunication should be sender and receiver oriented?2.What...
1.What does Drucker mean when he suggests that communication should be sender and receiver oriented?2.What does Drucker mean when he suggests that Management as a social science is always changing?3.Why did business and non-profit leaders in the U.S. avoid using the word, 'management,' during the late 1920's and early 1930's? 
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT