Question

In: Other

Which of the following business messages would not use the direct strategy? a. An e-mail message...

Which of the following business messages would not use the direct strategy?

a. An e-mail message to a staff introuducing a new employee

b. A letter a customer denying his or her request for credit

c. A letter to a coworker congratulating him or her on a recent promotion

d. An oral presentation detailing the specifics of a new company wellness initiative

Solutions

Expert Solution

Correct answer is option b

Direct strategy is a strategy in which the communication is made short and to the point to save the time of the reader.A direct strategy should be used to convey messages that are pleasing or neutral for the reader.But where you have to deny or refuse a request or you think that the message may be unpleasant for the reader,an indirect strategy should be used.because an indirect strategy allows the sender to explain the situation elaborately and the reason behind the negative news


Related Solutions

The controller of a small business received the following e-mail with an authentic-looking e-mail address and...
The controller of a small business received the following e-mail with an authentic-looking e-mail address and logo: From: Big Bank [[email protected]] To: Justin Lewis, Controller, Small Business USA Subject: Official Notice for all users of Big Bank! Due to the increased incidence of fraud and identity theft, we are asking all bank customers to verify their account information on the following web page: www.antifraudbigbank.com Please confirm your account information as soon as possible. Failure to confirm your account information will...
Creating an e-mail Message Class e-mail. How we often communicate today…from Christmas lists, to pick up...
Creating an e-mail Message Class e-mail. How we often communicate today…from Christmas lists, to pick up from the store lists, to-do lists, to one-liner messages…all examples of communication using an e-mail message. Lab Assignment Objectives Understand what is meant by a class object's type and how the type determines the operators and methods that can be applied to the object. Know what a constructor does. Understand how a class corresponds to a namespace such that object method invocations translate to...
3.1 Radical Rewrite: Improving a Message About Checking References           Your Task. Analyze the following e-mail...
3.1 Radical Rewrite: Improving a Message About Checking References           Your Task. Analyze the following e-mail to be sent by the vice president of human resources to all managers: Step 1: Identify five or more weaknesses describing why each is a weakness. In addition to grammar faults, pay special attention to dangling modifiers, parallelism, and passive voice. Step 2: Revise this e-mail so that it reflects writing techniques you learned in this and previous chapters. To:           All Managers From:          Mark...
Elwin Osbourne, CIO at GFS, Inc., suspects that at least 25% of e-mail messages sent by...
Elwin Osbourne, CIO at GFS, Inc., suspects that at least 25% of e-mail messages sent by GFS employees are not business related. A random sample of 300 e-mail messages was selected to test this hypothesis at the 0.01 level of significance. Fifty-four of the messages were not business related. The appropriate decision is _______. increase the sample size gather more data reject the null hypothesis fail to reject the null hypothesis maintain status quo
Describe a type of business that would use job costing. What would the direct materials, direct...
Describe a type of business that would use job costing. What would the direct materials, direct labor, and overhead costs be for the project.
Don’ts of Electronic Mail Don’t • Use e-mail to discuss something with a colleague who sits...
Don’ts of Electronic Mail Don’t • Use e-mail to discuss something with a colleague who sits across the aisle or down the hall from you. Take the old-fashioned approach of speaking to each other. • Say anything negative about a boss, friend, or colleague via e-mail. And don’t forward the negative comments of others. • Use e-mail to start or perpetuate a feud. If you get an e-mail that tempts you to respond in a scathing manner, stop yourself. You...
The following poorly written e-mail tells customers that their e-mail addresses have been hacked. However, the...
The following poorly written e-mail tells customers that their e-mail addresses have been hacked. However, the message is clumsy and fails to include essential information in revealing security breaches to customers. Your Task. List at least seven weaknesses Revise this message using the suggestions you learned in this chapter about security breach messages. To: Kara Khalial [[email protected]] From: Justin Small [[email protected]] Subject: Customer Security Incident at Princeton Payment Systems Cc: Bcc: Companies and individuals across the country are experiencing more...
Let M(x, y) be "x has sent y an e-mail message" and T(x, y) be "...
Let M(x, y) be "x has sent y an e-mail message" and T(x, y) be " x has telephoned y, " where the domain consists of all students in your class. Use quantifiers to express each of these statements. g. There is a student in your class who sent every one else in your class an email message. I answer  ∃x( x ≠ y ∧ ∀? M (x, y) ) But answer on text book is  ∃x( x ≠ y → ∀?...
A small company involved in​ e-commerce is interested in statistics concerning the use of​ e-mail. A...
A small company involved in​ e-commerce is interested in statistics concerning the use of​ e-mail. A poll found that 37% of a random sample of 1122 adults, who use a computer at their​ home, work, or​ school, said they do not send or receive​ e-mail. Complete parts a through e. ​a) Find the margin of error for this poll if we want 90​% confidence in our estimate of the percent of American adults who do not use​ e-mail. b.) Explain...
Alyssa’s ex-husband, Tom, has sent Alyssa a number of threatening e-mail messages. Alyssa has found out...
Alyssa’s ex-husband, Tom, has sent Alyssa a number of threatening e-mail messages. Alyssa has found out that her ex-husband has also maliciously posted her personal information, including her social security number, name, home address, email address, cell phone number, and bra size on sadomasochistic websites. Tom has also used morphing technology to superimpose Alyssa’s face on pornographic images and videos on websites maintained by a third-party website operator. Tom is upset because Alyssa committed adultery during their marriage. Based on...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT