• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Communication and Presentation Techniques

Extracts from this document...

Introduction

D2 Communication and Presentation Techniques For this assignment I will be assess the suitability of the three methods used for Communicating and presenting information. The different methods that I'll talk about are e-mails, telephone communications and meetings. For this report I have chosen 2 verbal and 1 non verbal method of communication. The methods of communication that I have chosen to evaluate are Email, Telephone and Meetings. E-mails The shortened form of an Electronic mail is 'E-mail'. E-mail is a system of creating, sending and storing textual data in digital form over a network. Earlier, the e-mail system was based on Simple Mail Transfer mechanism, a protocol used in sending the e-mails from one server to another. Today's e-mail technology uses the store-and-forward model. In this model, the users send and receive information on their own computer terminal. E-mail is one of the many technological developments that has influenced our lives. It has changed the medium of communication. So, it becomes necessary for us to check out the benefits and harmful effects of this popular tool used on the Internet. Advantages of Email * Easy to use: E-mail frees us from the tedious task of managing data of daily use. ...read more.

Middle

* Spam: E-mails when used to send unsolicited messages and unwanted advertisements create nuisance and is termed as Spam. Checking and deleting these unwanted mails can unnecessarily consume a lot of time, and it has become necessary to block or filter the unwanted e-mails by means of spam filters. Spamming includes, sending hoax e-mails. E-mail spoofing is another common practice, used for spamming. Spoofing involves deceiving the recipient by altering the e-mail headers or the addresses from which the mail is sent. * Hacking: The act of breaking into computer security is termed as hacking. After the e-mail is sent and before it is received by the desired recipient, it "bounces" between servers located in different parts of the world. Hence, the e-mail can be hacked by a professional hacker. * Misinterpretation: One has to be careful while posting any kind of content through an e-mail. If typed in a hurry, the matter could be misinterpreted. * Lengthy mails: If the mail is too long and not properly presented the reader may lose interest in reading it. * Not suitable for business: Since the content posted via e-mails is considered informal, there is a chance of business documents going unnoticed. ...read more.

Conclusion

Disadvantage of Telephone Usage: We can't take it wherever we go so we will not be able to receive phone calls , it occupies lot space, needs lots of connections. Meetings Meetings are held to discuss important issues that may arise in the company. There are several advantages and disadvantages to holding meeting and they are as follows: Meetings are great for people who work best face to face. The advantage of meetings is it allows them to see the progress of what they are doing or what are others are doing in terms of everyday work or projects. Meetings are a great way to explain complex and non-complex ideas and offer a great format to exchange ideas and really think them out. Meetings are a great way to communicate lots of information a short amount of time and create a plan for the future ahead. The best meeting is one with an agenda and a time frame of how long the meeting will take. The disadvantages of meeting they are time consuming and at times tedious. They can become a tool of grandstanding, boasting, and a format for picking on people. The worst meetings are those where you meet to talk about the next meeting ahead, have no agenda, drag on and nothing productive comes from it. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. Sainsbury's communication methods.

    Meetings are also held with the staff. Senior management meeting usually takes place monthly and staff meetings held weekly. Meetings can save a lot of time and can get feedback from the people at the meeting immediately. It also saves time on having to discuss things individually.

  2. Interviewing Techniques.

    Merton et al (1956) wrote "The Focus Interview" a classic in this area. Using the focus group method is an efficient technique of qualitative data collection and it is also very timesaving, whereas a group is interviewed rather than an individual.

  1. The Use of Geographical Information Systems (GIS) And International Technology Transfer by Non-Governmental ...

    on, have a geographic context and in any analysis this aspect must be considered. Understanding issues ranging from epidemiology to access to healthcare providers requires understanding the geographic context of these issues. GIS technology is one of the fastest growing technology in health and is helping professionals in the ever

  2. Information and Communication Technology

    The complete order from is then given to the customer who takes it to one of the sales points and hands it to the member of staff. The staff member locates the item's barcode on a set of cards and is kept at the sales point and scans it in.

  1. Technology as a tool of transformation.

    production work 2. coordination work 3. management work Production work This is associated with the implementation of robotic and process control instruments in production process, data processing computers for billing and account payable and effect of computer assisted design and computer assisted manufacturing in knowledge production.

  2. How standard documents are presented. I have chosen six standard documents to analyze. Three ...

    Bullets These are not required to be used in the lists as the table is neat and easy to follow with out bullet points. Also the table has a light green fill on every other column, this also makes it clear to see. Tables There are three tables in total.

  1. E-commerce and its effects in Ireland

    This is particularly important in attracting the major information and news services to locate here. The regulations should set out the parameters for determining negligence in respect of such material. 3.1.7 Unsolicited Commercial E-mail Spamming is the practice of sending unsolicited commercial material, such as mass mail shots, to communities or individuals across the Internet.

  2. The history behind the Boots.

    Also in becoming a PLC the company has to agree that it will publish its accounts annually open to anyone who wishes to access them. Along with this it must produce a detailed prospectus giving information about the company i.e.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work