Preview

Nt1330 Week 1 Assignment

Satisfactory Essays
Open Document
Open Document
598 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Week 1 Assignment
MBA Week 1 Assignment

Scenario 1.

* What Communication Channel will you use?
We would use telephone and web conferencing to develop a strategy. The product is being rolled out in a global market so we would need to communicate to all the sites in the different continents. * Why is this channel the best choice in this situation?
Time being of essence here this mode of communication would be the best and fastest. It will be easier to get feedback as well as keep track of all the meetings. * What communication channel will you use to convey the strategy to the VP of Operations?
The best channel would be to meet with him/her in person. There is not sufficient time to send emails and wait on responses or approvals.
…show more content…
The best way would be to pick up the phone and talk to the support person. Email might also be an option but the entire staff cannot function efficiently without a password for the computer, it might be better to use the phone.

* Why is this the best choice? Email might also be an option but the entire staff cannot function efficiently without a password for the computer, it might be better to use the phone. * What communication channel will you use to inform your employees of what happened and provide them with the new login name and password?
First email the staff and let them know what had happened and provide them the new password. Once the staff is able to login and perform their routine work without any issues then call for a staff meeting face to face to discuss as well as set some security practices so that this does not recur again. * Why is this channel the best choice in this situation?
Email is needed so that the staff will have the password stored for future reference. Face to face is needed to set some rules to prevent it from happening again. * What communication channel do you use to inform your employees of the reduction in

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Now, select a virtual switch depending on how you have configured the host. Proceed to the configuration of port properties. Give the port a specific name. I have given the label as ‘VMK’. Enter VLAN ID if there is any or else chose ‘None’. Put a check next to the ‘Virtual SAN traffic’ box and then click ‘Next’. Now start with configuring IPv4 settings for this port. After completing that, click ‘Next’. Click on the finish button to end the configuration for port group creation. Make sure that the group is created. Again a new window will pop up showing the devices created and their respective IP addresses. After confirming that the host is created, repeat this procedure two more times, since we require at least three hosts for configuring VSAN.…

    • 229 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Grandfather – father – Son: According to this backup rotation schedule incremental backups are performed daily, while full backups are done weekly and monthly.…

    • 770 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    They may even share their login id and password with others. It is better if the IT members create software which asks certain questions before they log into the data.…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    I think that the organizations requirements for user's passwords to be several character long and have a certain amount of attempts is actually a great security measure. Yes, i think the additional security is worth it. I also think the number of security entry should be limited. The reason I agree with both is because if they were not in place it woud give people an easier chance of unlocking you phone and disappearing with it. For example, I have an Iphone i went to a friends get together. I place my phone down for 5 minute to get a drink someone took my phone and was trying to unlock it. The person could not get my code correct so my phone shut him out completely. I was happy because my information was protected.…

    • 413 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ® Written communication by exchange of letters, emails or faxes. I would use every day to communicate with customer, colleagues at work and with my supervisors…

    • 2039 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    |Managers |The managers hold all the knowledge |All meetings are in person, so there is |The meeting will not take up much time|While speaking to the audience it is a must |…

    • 521 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CIPD Notes

    • 834 Words
    • 4 Pages

    2. A questionnaire was issued to 20 members of staff to discover the most effective communication method. Staff members were chosen through random sampling.…

    • 834 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    As per the accident that happened in the company about some employees was viewing pornography on company computer and he had a hard time to get his employees admitted that they were the one who doing it. He should use limit access by individual passwords for each person to log in the computer systems. To make sure that which person was log on in the computer and do bad thing during that period.…

    • 750 Words
    • 3 Pages
    Better Essays
  • Good Essays

    This is another big aspect of being a staff member. I will try to resolve any issue that they tell me like insiding and dying to a hacker if I can't resolve the issue I will contact a higher staff know the situation and get…

    • 1821 Words
    • 8 Pages
    Good Essays
  • Good Essays

    The progression of information technology and communications in the workplace has been gigantic over the past twenty years. The internet explosion has allowed people fingertip access to more information than previous generations had access to in entire lifetimes. The internet is what led to the creation of what is now the most-used means of communication in the modern workplace—email. In the past two decades, email has evolved from being a computer company exclusive to a communication tool no modern corporation would envision itself without. As stated by Kristie Lorette of Demand Media, “Email is widely used as a form of business communication and overall it is a highly effective communication tool. Email is inexpensive, only requiring an Internet connection that is generally already present in the business. Although a printout of emails is possible, emails often stay as soft copies because archiving and retrieving email communications is easy to do. From the CEO to the janitorial staff and even temporary employees of the business can send and receive email communications.”…

    • 686 Words
    • 3 Pages
    Good Essays
  • Good Essays

    3) Transmission. This can be done by various methods. In certain cases it may be more effective to use written communication such as email or fax. At other times verbal transmission may be…

    • 1331 Words
    • 6 Pages
    Good Essays
  • Good Essays

    User setup and passwords are maintained by the Systems Support Team (please contact telephone number Customer Services 01332 868900) please see: Figure 8. Password Maintenance…

    • 539 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    GOOD ONLINE SECURITY HABITS Submitted by: Rashi Kashyap Submitted to: Miss Aarti Vig CREATE STRONG PASSWORDS AND CHANGE THEM ACCORDINGLY Passwords are the keys to the kingdom and are often the only thing standing between your private information and the rest of the world.  Make passwords long and complex  Use a mix of upper and lower case letters  Use numeric and special characters when possible …

    • 334 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hotmail Retrieval

    • 316 Words
    • 2 Pages

    You are taken to the (step 2 of 2) of the Reset Your Password page.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Computer Class

    • 419 Words
    • 2 Pages

    Password Management: You must remember multiple user names and passwords to access various computer resources within your company. Each time your company introduces a new system, you must remember a new user name and password, some of which you are unable to customize. What steps will you take to manage your passwords?…

    • 419 Words
    • 2 Pages
    Satisfactory Essays

Related Topics