• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Communication and Presentation Techniques

Extracts from this document...

Introduction

D2 Communication and Presentation Techniques For this assignment I will be assess the suitability of the three methods used for Communicating and presenting information. The different methods that I'll talk about are e-mails, telephone communications and meetings. For this report I have chosen 2 verbal and 1 non verbal method of communication. The methods of communication that I have chosen to evaluate are Email, Telephone and Meetings. E-mails The shortened form of an Electronic mail is 'E-mail'. E-mail is a system of creating, sending and storing textual data in digital form over a network. Earlier, the e-mail system was based on Simple Mail Transfer mechanism, a protocol used in sending the e-mails from one server to another. Today's e-mail technology uses the store-and-forward model. In this model, the users send and receive information on their own computer terminal. E-mail is one of the many technological developments that has influenced our lives. It has changed the medium of communication. So, it becomes necessary for us to check out the benefits and harmful effects of this popular tool used on the Internet. Advantages of Email * Easy to use: E-mail frees us from the tedious task of managing data of daily use. ...read more.

Middle

* Spam: E-mails when used to send unsolicited messages and unwanted advertisements create nuisance and is termed as Spam. Checking and deleting these unwanted mails can unnecessarily consume a lot of time, and it has become necessary to block or filter the unwanted e-mails by means of spam filters. Spamming includes, sending hoax e-mails. E-mail spoofing is another common practice, used for spamming. Spoofing involves deceiving the recipient by altering the e-mail headers or the addresses from which the mail is sent. * Hacking: The act of breaking into computer security is termed as hacking. After the e-mail is sent and before it is received by the desired recipient, it "bounces" between servers located in different parts of the world. Hence, the e-mail can be hacked by a professional hacker. * Misinterpretation: One has to be careful while posting any kind of content through an e-mail. If typed in a hurry, the matter could be misinterpreted. * Lengthy mails: If the mail is too long and not properly presented the reader may lose interest in reading it. * Not suitable for business: Since the content posted via e-mails is considered informal, there is a chance of business documents going unnoticed. ...read more.

Conclusion

Disadvantage of Telephone Usage: We can't take it wherever we go so we will not be able to receive phone calls , it occupies lot space, needs lots of connections. Meetings Meetings are held to discuss important issues that may arise in the company. There are several advantages and disadvantages to holding meeting and they are as follows: Meetings are great for people who work best face to face. The advantage of meetings is it allows them to see the progress of what they are doing or what are others are doing in terms of everyday work or projects. Meetings are a great way to explain complex and non-complex ideas and offer a great format to exchange ideas and really think them out. Meetings are a great way to communicate lots of information a short amount of time and create a plan for the future ahead. The best meeting is one with an agenda and a time frame of how long the meeting will take. The disadvantages of meeting they are time consuming and at times tedious. They can become a tool of grandstanding, boasting, and a format for picking on people. The worst meetings are those where you meet to talk about the next meeting ahead, have no agenda, drag on and nothing productive comes from it. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. Sainsbury's communication methods.

    than regular methods Telephone: This is to pass on information to other staff or enquire about something concerning the company Meetings: This is used with the senior management such as the store, deputy and department managers. Meetings are also held with the staff.

  2. Information and Communication Technology

    of order details Mail Order Clerk Warehouse Manager Internal Mail 4 2 Part order form (1st copy) Warehouse manager Garment Manufacturer Post 5 2 part order form (2nd Copy) Warehouse manager Finance Department Internal Mail 6 Invoice Garment Manufacturer Finance Department Post 7 Team logo and team number Warehouse manager

  1. Technology as a tool of transformation.

    This may lead redundancy in the organisations. Co ordination work This is associated with the developments in communication networks through ICT at local, intra and inters organisations levels. Redundancy A large number of unemployment is due to organisations replace workers with technology.

  2. How standard documents are presented. I have chosen six standard documents to analyze. Three ...

    Lists are used to show the products purchased. No bullet points are used as the text is neatly spaced out. At the top of the page there is some contact information for the customer. The title for the page is in the background.

  1. Interviewing Techniques.

    The semi-structured approach is very common and tends to be the choice in much qualitative work. The advantages of this method are that there is a natural conversation flow and respondents are free to explore other avenues of thought.

  2. E-commerce and its effects in Ireland

    treaty and relevant EU legislation that regulates the export of products with encryption software built in. The US government exempts the export of products that contain weak encryption of up to a maximum of 56 bits but controls the export of higher-bit products.

  1. The history behind the Boots.

    Marketing Finance Administration Research and development The Human resource management department of the business is responsible for the hiring and firing of the staff that work in Boots PLC outlet stores and any other jobs that are related to the company.

  2. Power Point Presentation.

    Being able to animate screen objects would be a great addition to any information system and is also much easier to implement using presentation software rather than a database. The user would prefer a menu-driven system to make the system interactive, so it will develop this type of software rather than a kiosk -style presentation.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work