Question

In: Finance

5.2 Radical Rewrite: Information E-Mail—Tips for Conferencing (L.O. 1) Gabriel Lugo, a blogger and Web conferencing...

5.2 Radical Rewrite: Information E-Mail—Tips for Conferencing (L.O. 1) Gabriel Lugo, a blogger and Web conferencing expert, responds to a request from Samantha Staiger, who wants advice for an article she is writing. Gabriel’s advice is good, but his message is poorly organized, contains grammar and other errors, and is hard to read. Your Task. Analyze the following message and list at least five weaknesses. Then revise it if your instructor advises. To: Samantha Staiger From: Gabriel Lugo Subject: Your Request Dear Samantha Staiger: Hey, thanks for asking me to make a contribution to the article you are preparing and working up for Networking Voices. Appreciate this opportunity! Although you asked me to keep it brief, I could give you an extensive, comprehensive list of dos and don'ts for Web conferencing. If you want this, let me know. As an alternative to in-person meetings, Web conferencing is increasingly popular. Here's five tips for your article. First and foremost, plan ahead. All participants should be notified of things like the date, time, and duration. It's your job to send log-ins, passwords, and printed documents by e-mail. My next advise is about identifying yourself. Don't assume that attendees will automatically recognize your voice. The first few times you speak, its good to state your name. Another tip has to do with muting (turning off) your phone. Believe me, there's nothing worse than barking dogs, side conversations. And worst of all is the sound of toilets flushing during a conference. Ick! You should play with your microphone and speakers until you sound good. And of course, don't shuffle papers. Don't eat. Don't move things while your speaking. My final tip involves using a lobby slide to open. This is a slide that tells the meeting details. Such as the start time, audio information, and the agenda. This lobby slide should go up about 10 to 15 minutes before the meeting begins. Hope this helps! Gabe Gabriel Lugo | Gabe’s World Blog | [email protected] | [List at least five weaknesses.]

Solutions

Expert Solution


Related Solutions

6.2        Radical Rewrite: Instruction E-Mail—Tips for Avoiding Hackers Your Task. Analyze the following e-mail to be sent...
6.2        Radical Rewrite: Instruction E-Mail—Tips for Avoiding Hackers Your Task. Analyze the following e-mail to be sent by the CEO to all employees. Step 1: Identify five or more weaknesses describing why each is a weakness. Step 2: Revise this e-mail so that it reflects writing techniques you learned in this and previous chapters. To:           Staff Members From:          G. B. Goldman <[email protected]> Subject: Hackers!                 Staff Members: This is to inform you that, like other banks, we are afraid of hackers....
3.1 Radical Rewrite: Improving a Message About Checking References           Your Task. Analyze the following e-mail...
3.1 Radical Rewrite: Improving a Message About Checking References           Your Task. Analyze the following e-mail to be sent by the vice president of human resources to all managers: Step 1: Identify five or more weaknesses describing why each is a weakness. In addition to grammar faults, pay special attention to dangling modifiers, parallelism, and passive voice. Step 2: Revise this e-mail so that it reflects writing techniques you learned in this and previous chapters. To:           All Managers From:          Mark...
13. Which e-mail protocol transfers information from the mail server to the user's desktop? 14. List...
13. Which e-mail protocol transfers information from the mail server to the user's desktop? 14. List six Internet top level domain suffixes. 15. Which are the three SNMP management modes? 16. Will typing in you browser's Address line the command "http://telnet.westnetinc.com allow FTP access?
4. What is the most popular application service? a. World Wide Web b. E-mail c. P2P...
4. What is the most popular application service? a. World Wide Web b. E-mail c. P2P d. eBay 9. The different top-level domains represent which of the following? (Choose all correct answers.) a. Type of organization b. Country of origin c. Company or brand name d. File server name
1. We have seen that, in general, workplace e-mail monitoring is legal. In the landmark Smyth...
1. We have seen that, in general, workplace e-mail monitoring is legal. In the landmark Smyth v, Pillsbury case at the start of this chapter, employees fired for messages sent through the employer's server, even when password-protected, and even when the employer had issued assurances that they would not be for retaliatory purposes, had no recourse. But what if the employer monitors messages sent on company-owned computers through a personal e-mail account, such as Yahoo? In 2008, Scott Sidell allegedly...
Video #1: E Commerce Marketing Strategy 12 Killer Tips Presented by Marketing 360 video 11 minutes...
Video #1: E Commerce Marketing Strategy 12 Killer Tips Presented by Marketing 360 video 11 minutes Video #2: Digital Marketing Strategy E Commerce Distribution by Tom Walsham who is Director of Purduct for The Working Group (TWG) video 17 minutes Complete a 1-2 page paper (double-spaced) about the differences in these videos. Include main points from both videos One thing you agreed with in each video One thing you disagreed with in each video most helpful information you gained how...
You are tasked with developing a Web site for a new e-commerce business. In 1–2 paragraphs,...
You are tasked with developing a Web site for a new e-commerce business. In 1–2 paragraphs, describe how will you start the process of collecting the requirements for the project. Include the following in your answer: The types of requirements you need to consider, such as business requirements, business rules, constraints, external interfaces, and so forth Identify the three levels of requirements and how the different types of requirements will map to these levels How the different stakeholders will participate...
1. Health insurance exchanges will make web-based, comparative information on the features and costs of health...
1. Health insurance exchanges will make web-based, comparative information on the features and costs of health insurance plans available to facilitate informed choices. What barriers or challenges might be expected in requiring consumers to participate in their selection of health insurance plans?
Unit5 : PROBLEM SOLVING AND DECISION MAKING 1- Define: e. Information. f. A management information system...
Unit5 : PROBLEM SOLVING AND DECISION MAKING 1- Define: e. Information. f. A management information system (MIS). g. Creativity. 2- Describe the PDCA cycle as model to solve problem.(Fig 1 294). 3- Describe the Toyota method for problem solving.(Fig 3-296). 4- Define the decision-making model.(fig 4-299) 5- What is the problem caused by information overload? 6- What is the Creative Process? and How to Help People Think Creatively?
1.Information Technology leaders, including information assurance and security professionals, communicate through various channels including e-mails, texts,...
1.Information Technology leaders, including information assurance and security professionals, communicate through various channels including e-mails, texts, and social media. It is imperative that the IAS professional communicates in a concise, professional, and courteous manner. The tone of the communication impacts how the receiver interprets it. Based on the readings in this unit, you study the different aspects of planning and drafting message with an intended meaning. Employing an adaptive writing technique and use of positive and courteous tone and language...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT