Business Communication Chapter 5 The Content Email Message Could Have Embarrassing

subject Type Homework Help
subject Pages 9
subject Words 5895
subject Authors Carol M. Lehman, Debbie D. DuFrene, Robyn Walker

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Name:
Class:
Date:
Multiple Choice
1. Which of the following is true of data security?
a.
Policies associated with data security generally require that employees share data informally.
b.
The responsibilities of collecting, handling, and storing data properly rest solely with a company's database
administrator.
c.
Risks associated with data security include breaches of confidentiality and failure to offer choice in what
information is shared.
d.
Even data that is no longer needed should be preserved securely.
2. Identify a true statement about channel selection.
a.
If a message is straightforward and informative, a technological communication channel is inappropriate.
b.
Before choosing a communication channel, it should be determined whether a permanent record of a message
is needed or if a temporary form would suffice.
c.
An electronic communication tool is appropriate for communicating bad-news messages in sensitive
situations.
d.
Personal interaction cannot replace written communication, printed or online, which is essential in today's
team-based work environments.
3. Which of the following statements is true of a company's right over its employees' electronic communication?
a.
Employees' electronic communications cannot be intercepted by a company.
b.
US courts have denied the right of companies to monitor the electronic mail of employees.
c.
A company can monitor its employees' electronic communications without consent.
d.
A company technically owns its employees' electronic communications.
4. Which of the following considerations must be made before sending a message?
a.
An electronic format is preferred over a face-to-face encounter for sensitive situations.
b.
A technological option is inappropriate if the message is straightforward and informative.
c.
Messages cannot be retrieved once they are deleted.
d.
The communication channel should fit the sender's purpose.
5. Which of the following is true of email?
a.
It is costly if used for communicating with people located in different time zones.
b.
It is best suited for delivering sensitive and confidential information.
c.
It offers a personal touch to business communication.
d.
It facilitates the fast, convenient flow of information among users at various locations.
6. _____ is effective when sending a single message to several recipients and when needing to communicate 24 hours a
day, 365 days a year.
a.
Email
page-pf2
Name:
Class:
Date:
b.
Spyware
c.
A wiki
d.
A weblog
7. Which of the following is an advantage of email communication?
a.
It reduces a company's costs.
b.
It offers a personal touch.
c.
It is safe from malicious attacks.
d.
It ensures a quick verbal response.
8. Which of the following guidelines should you follow for effective email communication?
a.
Send to single or multiple addressees.
b.
Avoid restating the subject in the body of a message.
c.
Focus on multiple topics in a single message.
d.
Avoid using graphic highlighting.
9. Who among the following adheres to the guidelines for preparing effective email messages?
a.
Alan, who focuses on multiple topics and addresses all of them in the email
b.
Ellis, who restates the subject in the body of the message
c.
Jake, who avoids using a descriptive subject line
d.
Mary, who avoids integrating graphs and pictures into the email
10. Which of the following is a guideline that assists in effective email usage?
a.
Check mails once every week.
b.
Do not contribute to email overload.
c.
Send messages that are formatted.
d.
Do not use separate accounts for receiving messages.
11. Aaron, an employee of MindRaft Inc., had an argument with one of his colleagues, Ron. Following this, Aaron sent
hate mails containing sarcastic and offensive statements to Ron. In this scenario, the message sent by Aaron is an example
of a _____.
a.
spam
b.
flame
c.
slander
d.
hoax
12. _____, which are websites that provide virtual communities in which people with shared interests can communicate,
are common sources of viruses and spyware.
page-pf3
Name:
Class:
Date:
a.
Uniform resource locators
b.
Social networking sites
c.
Web browsers
d.
Proxy servers
13. Which of the following statements is true of instant messaging (IM)?
a.
With IM, your conversation with someone is free from eavesdropping.
b.
With IM, it is important to pay careful attention to spelling and grammar when trading messages.
c.
The best known IM programs require special hardware and training.
d.
To use IM, you maintain a list of people with whom you want to interact.
14. Chris and Stephanie are friends who reside in two different states. They stay in touch with the help of a computer
program that allows them to send messages to each other that both of them can immediately see when they are online. In
this scenario, the technology used by Chris and Stephanie is:
a.
blogging.
b.
phishing.
c.
text messaging.
d.
instant messaging.
15. Which of the following statements is true of text messaging?
a.
It cannot be used to send messages from a cellphone to a computer.
b.
It puts less premium on conciseness than email.
c.
It is a refinement of computer instant messaging.
d.
It cannot be used for business purposes.
16. _____ is particularly well suited to text messaging because the names of the numbers are also close to the sounds of
certain words.
a.
Mandarin
b.
Arabic
c.
Japanese
d.
English
17. Identify a true statement about the legal requirements governing electronic messages.
a.
A copy of an electronic message cannot be produced as verification in the courts.
b.
Inability to locate emails and other documents demanded by courts cannot be considered negligence.
c.
Evidence produced by companies in the form of an email is considered invalid by the courts.
d.
Destroying email messages in violation of securities rules is a sure path to destruction.
page-pf4
Name:
Class:
Date:
18. To avoid the legal perils of electronic communications, employees must be taught to:
a.
write loose messages.
b.
use technical jargon.
c.
delete all old messages.
d.
organize relevant messages.
19. Which of the following is true of effective Web writing?
a.
Web users refer frequently to directions and are likely to read little notes, sidebars, and help files.
b.
Information on a website should follow the pyramid style of writing common in newspaper writing.
c.
Web users can more quickly scan items in rows rather than columns.
d.
English-speaking readers typically start scanning at the right side of the main content area of a website.
20. Stuart is agitated by the political developments that took place in his country in the last couple of months and decides
to share his views. He posts his concerns online by filling a simple online form on his browser. The visitors to his online
journal can post comments. The technology used in this scenario is an example of:
a.
crowdsourcing.
b.
Skyping.
c.
blogging.
d.
Yammering.
21. Who among the following is following a good practice while writing for a website?
a.
James, who avoids highlighting the content area on his website
b.
Jane, who categorizes and groups items in columns rather than rows on her website
c.
Zafar, who places little notes, sidebars, and help files on his website
d.
Alisha, who places the main idea at the end of the content area on her website
22. Which of the following is a difference between web pages and social media?
a.
Unlike web pages, social media prohibits users from generating their own content.
b.
Unlike web pages, social media enables people to connect online and have a conversation.
c.
Unlike web pages, social media is not generally interactive.
d.
Unlike web pages, social media requires authorization before posting.
23. Which of the following is a Web 2.0 technology?
a.
A database
b.
A wiki
c.
A flame
d.
A cookie
page-pf5
Name:
Class:
Date:
24. _____ are dynamic, with rapidly changing content that does not require authorization to post.
a.
Flames
b.
Cookies
c.
Blogs
d.
Websites
25. A _____ is a collaborative website that hosts the collective work of many authors.
a.
weblog
b.
wiki
c.
flame
d.
cookie
26. Which of the following statements is true of voice mail technology?
a.
It makes it possible for people to participate on the Web.
b.
It allows flexibility in staying in touch without the aid of a computer.
c.
It has rapidly changing content that requires authorization to post.
d.
It provides a platform for people with shared interests to communicate.
27. Abdul, a manager at Chrysum Corp., was assigned the task of overseeing the operations in a foreign office for a week.
Before leaving the country, Abdul recorded a message on his phone to inform callers that he was away from home and
would return their calls when he returned. In this scenario, the technology used by Abdul is an example of:
a.
instant messaging.
b.
weblogging.
c.
cellphone communication.
d.
voice mail communication.
28. Which of the following is a guideline for effective voice mail communication?
a.
Refrain from updating your greeting often.
b.
Encourage callers to leave detailed messages.
c.
Never leave your email address or fax number on your greeting.
d.
Check your voice mail once a week.
29. Which of the following tips should be followed to improve voice mail communication?
a.
Speak fast and in a loud voice.
b.
Keep your message brief, typically 60 seconds or less.
c.
Avoid updating your greeting frequently.
d.
Avoid repeating your name and phone number.
page-pf6
Name:
Class:
Date:
30. Which of the following is true of cellphone communication?
a.
It ensures complete confidentiality.
b.
It improves performance among salespersons by improving their outreach to clients.
c.
It is free from policies and legal restrictions.
d.
It is cost-effective when communicating with people located in several time zones.
31. Identify a true statement about cellphone communication.
a.
Cellphone communication dramatically deteriorates performance among salespersons.
b.
Confidential or sensitive information can be effectively shared through cellphones.
c.
Cellphone communication is cost-effective when communicating with people located in several locations and
time zones.
d.
The radio frequencies that transmit the voice signals in cellphone communication can be picked up by other
equipment.
32. In the context of channels of virtual collaboration, virtual teams can use _____ that can serve as an electronic bulletin
board.
a.
memos
b.
wikis
c.
cookies
d.
caches
33. _____ is a popular software program that lets participants share what's on their personal computer with the entire
group, including PowerPoint slides, data summaries, and written reports.
a.
GoToMeeting
b.
JavaScript
c.
Visual Studio
d.
LinkSwift
34. Which of the following is true of electronic meeting systems (EMS)?
a.
They are a group of Internet-based applications that allow the creation of user-generated content.
b.
They enable group members in brainstorming ideas, voting, outlining ideas, or expanding on the ideas of
others.
c.
They cannot be used when people are not in the same room at the same time.
d.
They consist of computer software programs that can help group members collaborate when meeting face-to-
face.
35. Which of the following is a category of virtual team management tools that allows you to chat in real-time with your
team members?
a.
File sharing
b.
Scheduling
page-pf7
Name:
Class:
Date:
c.
Instant messaging
d.
Meeting
36. _____ is a virtual team management tool for scheduling.
a.
Sqwiggle
b.
Doodle
c.
Brix
d.
Jive
37. Which of the following is a virtual team management tool for team games?
a.
Prelude
b.
Blackboard
c.
Huddle
d.
Jive
38. _____ are email messages that incite panic, typically related to risks of computer viruses or deadly threats, and urge
you to forward them to as many people as possible.
a.
Flames
b.
Computer hoaxes
c.
Cold emails
d.
Mousetraps
39. Which of the following is true of a blog?
a.
It allows visitors to change the original posted material and add comments.
b.
It provides complete anonymity to all users in the internal blogs used in organizations.
c.
It can be used as an online scrapbook, a personal diary, or a digital soapbox.
d.
It rarely has the capacity to store knowledge in archives for future use.
40. Which of the following is a true statement about virtual communication in organizations?
a.
Video conferences are less effective than face-to-face meetings in the case of a structured discussion.
b.
Long email threads are considered a communication pitfall.
c.
The preference for digital mediums is seen to increase with age.
d.
Emails appear to magnify status differences among team members.
True / False
41. Data mining is difficult to judge in terms of its ethicality.
a.
True
page-pf8
Name:
Class:
Date:
b.
False
42. For delivering a message that is straightforward and informative, a face-to-face encounter is preferred over a
technological channel.
a.
True
b.
False
43. Written communication, printed or online, can replace the personal interaction essential in today's team-based work
environments.
a.
True
b.
False
44. Undeliverable email messages are delivered to a mail administrator.
a.
True
b.
False
45. A deleted message cannot be resurrected.
a.
True
b.
False
46. Whenever possible, use an electronic communication tool as an avoidance mechanism.
a.
True
b.
False
47. A sender should give his or preference the utmost importance when choosing a communication channel.
a.
True
b.
False
48. Jargon is the buzzword for proper behavior on the Internet.
a.
True
b.
False
49. Blogging is a real-time email technology that blends email with conversation.
a.
True
b.
False
page-pf9
Name:
Class:
Date:
50. The typical cellphone screen can accommodate no more than 100 characters.
a.
True
b.
False
51. Text messaging cannot be used for business purposes as it is strictly a social communication tool.
a.
True
b.
False
52. Companies are not authorized to monitor the electronic mail of an employee.
a.
True
b.
False
53. An employer must have either a warrant or an employee's permission to view messages stored by someone other than
the employer.
a.
True
b.
False
54. English-speaking readers typically start scanning at the top right side of the main content area of a website.
a.
True
b.
False
55. On a website, users can more quickly scan items in rows rather than columns.
a.
True
b.
False
56. Information that is confidential or sensitive can be securely shared through cellphone communication.
a.
True
b.
False
57. All virtual communication is mediated by technology but they differ because communication can be achieved through
voice, text, video, or some combination of these.
a.
True
b.
False
58. Face-to-face meetings are more effective than video-conferences when participants are involved in a structured
discussion.
a.
True
page-pfa
Name:
Class:
Date:
b.
False
59. When wiki writing, use the first-person blogging style as wikis are typically the place for personal opinion and
analysis.
a.
True
b.
False
Essay
60. Discuss the risks associated with data security. What measures are taken by organizations to guide
employees in the proper use of technology to safeguard information?
61. How can the purpose of a message be determined before choosing a communication channel?
62. Why it is important to determine whether an information is personal or confidential before choosing a
communication channel?
page-pfb
Name:
Class:
Date:
63. Why it is important to determine whether positive human relations are sacrificed before choosing a
communication channel?
64. List four advantages of electronic mail communication.
65. Camponi Fashions Inc. gives its sales consultants an allowance of $2,000 for purchase of clothing from the current
line of products. Any purchase beyond this allowance can be made at a 15% discount. Due to an economic downturn, the
management reduces the clothing allowance for the upcoming year to $1,000 and the purchase discount to 10%. When the
company returns to normal profit levels in the future, the original allowance and discount would be restored.
Required: As a sales manager of the company, write an email message conveying the change in policy for the upcoming
year.
The following guidelines should be followed while writing the email message:
a. Use a neutral subject line written inductively in proper format, with a neutral statement or observation that does not
reveal the "bad news" or lead the readers to unrealistic expectations.
b. Provide specific details of the past clothing allowance and discount policies. State how these policies have benefited the
company and the consultants.
c. Review the current financial difficulties the company is experiencing.
d. State the specifics of the new allowance and discount policies in the middle paragraph in passive voice.
e. State the company's commitment to restore the previous policies once normal profits return.
page-pfc
66. Analyze the following email message for content, formatting, and email practices. Revise the message.
To: Staff
Subject: Changes
It has come to my attention that some of you apparently do not have enough work to keep yourselves busy. In the past six
months, since I assumed the position as your boss, I have observed many of you playing computer games, making
personal phone calls, and spending far too much time in personal conversations with each other. We have far too much
work in this department for all of you to waste time like this.
Effective immediately, the following changes will be enforced: (a) No personal use of the computer will be tolerated. (b)
No personal phone calls should be made except in case of an emergency. (c) Conversations must be limited to break time
and lunchtime, in the lunchroom only.
I expect your cooperation. Thank you.
Just a final reminder that we will have a staff meeting tomorrow at 3 p.m.
The analysis of the email is discussed below:
a. Subject line should be more detailed but not negative.
b. Tone of the email should not be harsh and condescending to avoid damage to morale and interpersonal relations.
c. Email should start by reminding staff of the busy workload, focusing on a positive team approach for accomplishing the
daily work.
d. Policy regarding personal use of computers and phones should be reviewed. Facts should be stated clearly to the staff,
but not in a harsh tone.
e. The staff meeting reminder should be sent in another email and not written as an afterthought to this email.
f. The email should preferably be sent as a confirmation of the changes, following discussion in a face-to-face staff
meeting.
page-pfd
67. You are the vice-president of sales for a Car Zone dealership in South Florida. Top sales people are annually
recognized with Bronze, Silver, or Gold awards, depending on the level of their sales. Sales people are recognized at an
annual banquet and presented with a certificate. The top sales person for the year is Brandon Spellman.
Required: Write an email message to Car Zone employees congratulating all award winners and announcing Brandon
Spellman as the top salesperson of the year.
The following guidelines should be followed while writing the email:
a. Write a subject line that mentions the topic, such as "Congratulations to Car Zone Top Sales People."
b. Begin the email message, written deductively, with congratulations to Brandon Spellman as the top sales person for the
year.
c. Provide the names of the winners of the Bronze, Silver, and Gold awards.
d. Explain the level of achievement required for receipt of these awards.
e. Close with a positive statement congratulating all award recipients.
page-pfe
Name:
Class:
Date:
68. What is instant messaging? Discuss its features and uses.
69. Discuss Web 2.0 technologies. Compare social media and web pages.
70. What is a wiki? Describe the guidelines that need to be followed for wiki writing.
71. Describe the policies created by companies to ensure that employees use social media responsibly.
page-pff
72. List the recommended guidelines for effective voice mail communication.
73. Describe the commonsense guidelines that help ensure that you are not seen as a discourteous cellphone
user.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.