Preview

Nt1330 Week 1 Assignment

Satisfactory Essays
Open Document
Open Document
598 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Week 1 Assignment
MBA Week 1 Assignment

Scenario 1.

* What Communication Channel will you use?
We would use telephone and web conferencing to develop a strategy. The product is being rolled out in a global market so we would need to communicate to all the sites in the different continents. * Why is this channel the best choice in this situation?
Time being of essence here this mode of communication would be the best and fastest. It will be easier to get feedback as well as keep track of all the meetings. * What communication channel will you use to convey the strategy to the VP of Operations?
The best channel would be to meet with him/her in person. There is not sufficient time to send emails and wait on responses or approvals.
…show more content…
The best way would be to pick up the phone and talk to the support person. Email might also be an option but the entire staff cannot function efficiently without a password for the computer, it might be better to use the phone.

* Why is this the best choice? Email might also be an option but the entire staff cannot function efficiently without a password for the computer, it might be better to use the phone. * What communication channel will you use to inform your employees of what happened and provide them with the new login name and password?
First email the staff and let them know what had happened and provide them the new password. Once the staff is able to login and perform their routine work without any issues then call for a staff meeting face to face to discuss as well as set some security practices so that this does not recur again. * Why is this channel the best choice in this situation?
Email is needed so that the staff will have the password stored for future reference. Face to face is needed to set some rules to prevent it from happening again. * What communication channel do you use to inform your employees of the reduction in

You May Also Find These Documents Helpful

  • Powerful Essays

    Adequate training has to be established for all staff members on how to use the system. Training could be done through the internet or done through IT support. To be able to have the adequate training for all staff members would need access to a PC, the new IT system and the internet. Training should take about two weeks. The…

    • 6284 Words
    • 26 Pages
    Powerful Essays
  • Powerful Essays

    ® Written communication by exchange of letters, emails or faxes. I would use every day to communicate with customer, colleagues at work and with my supervisors…

    • 2039 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    |Managers |The managers hold all the knowledge |All meetings are in person, so there is |The meeting will not take up much time|While speaking to the audience it is a must |…

    • 521 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This is another big aspect of being a staff member. I will try to resolve any issue that they tell me like insiding and dying to a hacker if I can't resolve the issue I will contact a higher staff know the situation and get…

    • 1821 Words
    • 8 Pages
    Good Essays
  • Good Essays

    The progression of information technology and communications in the workplace has been gigantic over the past twenty years. The internet explosion has allowed people fingertip access to more information than previous generations had access to in entire lifetimes. The internet is what led to the creation of what is now the most-used means of communication in the modern workplace—email. In the past two decades, email has evolved from being a computer company exclusive to a communication tool no modern corporation would envision itself without. As stated by Kristie Lorette of Demand Media, “Email is widely used as a form of business communication and overall it is a highly effective communication tool. Email is inexpensive, only requiring an Internet connection that is generally already present in the business. Although a printout of emails is possible, emails often stay as soft copies because archiving and retrieving email communications is easy to do. From the CEO to the janitorial staff and even temporary employees of the business can send and receive email communications.”…

    • 686 Words
    • 3 Pages
    Good Essays
  • Better Essays

    As per the accident that happened in the company about some employees was viewing pornography on company computer and he had a hard time to get his employees admitted that they were the one who doing it. He should use limit access by individual passwords for each person to log in the computer systems. To make sure that which person was log on in the computer and do bad thing during that period.…

    • 750 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Cjs250 Wk 5 D 7

    • 948 Words
    • 4 Pages

    Contact a security manager and conduct the interview listed in Part I (space has been provided for extra questions, should you ask any). Once the interview has been completed, answer the questions in Part II.…

    • 948 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Copper Mine Workers

    • 1010 Words
    • 5 Pages

    is involved the method of communication must be in keeping with the importance of the situation. A face to face…

    • 1010 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    dqwdqw

    • 273 Words
    • 2 Pages

    The best communication channel for this scenario is oral communication by (Phone); because all company associates use the computer application it is critical for IT to understand the problem, so that they can implement a countermeasure quickly. As for downward communication to my associates, I plan to use written communication by (Email). This will give me the opportunity to reach the whole team at onetime and for each associate to have a verifiable document of the new login name and password.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CIPD Notes

    • 834 Words
    • 4 Pages

    2. A questionnaire was issued to 20 members of staff to discover the most effective communication method. Staff members were chosen through random sampling.…

    • 834 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    nOTHIN

    • 1191 Words
    • 4 Pages

    SMS or Short Message Service is I believe would be more effective in this case. It is fast, short and straight to the point. I will be able to quickly send information in just minutes.…

    • 1191 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    GOOD ONLINE SECURITY HABITS Submitted by: Rashi Kashyap Submitted to: Miss Aarti Vig CREATE STRONG PASSWORDS AND CHANGE THEM ACCORDINGLY Passwords are the keys to the kingdom and are often the only thing standing between your private information and the rest of the world.  Make passwords long and complex  Use a mix of upper and lower case letters  Use numeric and special characters when possible …

    • 334 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hotmail Retrieval

    • 316 Words
    • 2 Pages

    You are taken to the (step 2 of 2) of the Reset Your Password page.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The most effective techniques used in the office would be the telephone and the venga instant messaging system. I have chosen these two as the most effective because information can be given to a specific staff member in a timely manner and it is usually in a way that can be understood. At times when a staff member is not able to get to the phone a message can be taken and sent to them via venga. Here you are able to tell the staff member exactly what the message is and leave a contact telephone number if it is required to call someone back.…

    • 761 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Computer Class

    • 419 Words
    • 2 Pages

    Password Management: You must remember multiple user names and passwords to access various computer resources within your company. Each time your company introduces a new system, you must remember a new user name and password, some of which you are unable to customize. What steps will you take to manage your passwords?…

    • 419 Words
    • 2 Pages
    Satisfactory Essays

Related Topics