Premium Essay

Assignment1

In:

Submitted By udamanbigp
Words 525
Pages 3
Assignment 1.1 Communication Process Model
- Who was the sender? My Supervisor
- Who was the receiver? Myself
- What was the message? My supervisor told me to get in the boat that we were working on.
- What was the channel used to send the message? The channel that was used to send the message was a face to face verbal communication
- What was the misunderstanding that occurred? I did not understand why he yelled at me and told me to get in the boat when I was standing at the back of the boat working on the lower unit when there were other co-workers around not doing anything and when he yelled at me that was very rude and made me feel like he was picking with me so I yelled back at him and asked him for what reason did he want me to get in the boat when you see me busy already working on the boat and the rest of my co-workers are standing around laughing at the situation. This also made me feel like he was trying to show off for the people and or power trip but he later told me the reason why he wanted me to get in the boat was to troubleshoot something in the console on the boat after he apologized for yelling at me.
- How could the misunderstanding have been avoided? The misunderstanding could have been avoided by him not yelling at me.
1 what did you learn about the communication process from this activity? I learned that the communication between me and my supervisor had a barrier it was called internal noise due to my belief in if you want respect you give it. This belief had blocked me from receiving his message clearly
2. What seemed to be the main causes of the misunderstanding? The yelling between supervisor and subordinate seemed to be the main cause of the misunderstanding.
- Who was the sender? The sender was the Life Insurance vendor
- Who was the receiver? The receiver was the Potential client
- What was the message? Protect your

Similar Documents

Premium Essay

Assignment1

...Practice 1: Overview This is the first of many practices in this course. Practices are intended to cover all topics that are presented in the corresponding lesson. Note the following location for the lab files: E:\labs\SQL1\labs If you are asked to save any lab files, save them at this location. To start ISQL*Plus, start your browser. You need to enter a URL to access iSQL*Plus. The URL requires the host name, which your instructor will provide. Enter the following command, replacing the host name with the value that your instructor provides: http://<HOSTNAME:5561>/isqlplus In any practice, there may be exercises that are prefaced with the phrases “If you have time” or “If you want an extra challenge.” Work on these exercises only if you have completed all other exercises in the allocated time and would like a further challenge to your skills. Perform the practices slowly and precisely. You can experiment with saving and running command files. If you have any questions at any time, ask your instructor. Practice 1 Test your knowledge: 1. Initiate an iSQL*Plus session using the user ID and password that are provided by the instructor. 2. iSQL*Plus commands access the database. True/False 3. The following SELECT statement executes successfully: SELECT last_name, job_id, salary AS Sal FROM employees; True/False 4. The following SELECT statement executes successfully: SELECT * FROM job_grades; True/False 5. There are four...

Words: 520 - Pages: 3

Premium Essay

Assignment1

...Assignment 1: Project Management Assessment Submitted by: Muhammad Naman Submitted to: Dr. Johnnie E. Drake, Jr. Submission Date: April 4, 2014 Course : EBM 680 Project Management ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Project Selected: Adelaide Desalination Plant ------------------------------------------------- Research Problem: South Australia, as the "driest state in the driest (inhabited) continent", experienced severe water shortages during periods of drought...

Words: 593 - Pages: 3

Premium Essay

Assignment1

...Estimating the standard deviation of grouped data The Internal Revenue Service (IRS) determines which income tax returns to audit by looking at, among other things, whether there are any unusual deductions claimed on the return. Last year, charitable deductions for a family of four earning between and averaged , with a standard deviation of . The IRS wishes to know whether the standard deviation this year is still around . To determine this, income tax returns for families of four earning between and were randomly selected from this year's tax filings. The charitable deductions claimed on the returns are summarized in the following histogram: 20 15 10 5 0 Frequency 4 16 12 4 4 900 1000 1100 1200 1300 1400 Charitable deduction (in dollars) Based on this histogram, estimate the standard deviation of the sample of deduction amounts. Carry your intermediate computations to at least four decimal places, and round your answer to at least one decimal place. (If necessary, consult a list of formulas.) The process for solving these problems is fairly long. Aleks recommends: . Then . I watched a video that condenses the process a bit. Its easier to group the sections included in this process into 4 rows and 4 columns. The first column should list the frequencies in the histogram. Next list the midpoints in the 2nd column. Then multiply the two columns by one another which produces column 3. Next multiply...

Words: 309 - Pages: 2

Premium Essay

Assignment1

...Financial Accounting and Information Systems Exam 2 Fall 2010 True/False (1 point) 1) According to GAAP revenue recognition criteria, in order for revenue to be recognized on the income statement, it must be earned and realized (realizable).T 2) Realized gains and losses on investments classified as trading securities are reported in a company's net income in the period that they are realized. 3) Accounts receivable (net) reported in the current asset section of a company's balance sheet represents the total amount owed by customers within the next year. F 4) In 2009, Dow Chemical Corporation plans to build a laboratory dedicated to a special project. The company will not use the laboratory after the project is finished. Under GAAP, this laboratory should be expensed. 5) Unearned revenue, a current operating liability, arises when a company receives cash before any goods are delivered or services are rendered. T 6) Contingent liabilities that are "probable" can be reasonably estimated are recorded on the balance sheet as a liability and as an expense in the income statement. T 7) For an item to be classified as extraordinary, it needs to be both unusual and infrequent. However, there is an exception for material items - for one-time items that are extremely large, firms have the option of classify these items as extraordinary to provide better information to investors. 8) LIFO inventory costing yields more accurate reporting of the inventory balance...

Words: 3073 - Pages: 13

Free Essay

Assignment1

...Homework #1 Calculate the usable area in square feet of a house. Assume that the house has a maximum of four rooms, and that each room is rectangular. Program Description The purpose of this program is to calculate the usable area (square feet) of a four room house. Analysis To calculate the usable area in square feet in the house I would first need to identify the inputs and outputs. I know the house has a maximum of 4 rooms that are rectangular in shape, this is my input. Using the area formula (L x W) I can determine the square feet for each room. Adding the square feet for each room will provide the amount of usable area in square feet of the house and my output for this program. Test Plan Test Case # | Input | Expected Output | Results | 1 | Room 1: length = 16, width = 14Room 2 length = 13, width = 13Room 3: length = 10, width = 11 | 503 square feet | Pass | 2 | Room 1: length = 12, width = 16Room 2 length = 11, width = 14Room 3: length = 10, width = 11 | 456 square feet | Pass | 3 | Room 1: length = 12, width = 12Room 2 length = 12, width = 11Room 3: length = 11, width = 10 | 386 square feet | Pass | Pseudocode //This program will calculate the usable area in square feet of a four room house //Declare WidthRoom1, LengthRoom1 As Float // Declare WidthRoom2, LengthRoom2 As Float //Declare WidthRoom3, LengthRoom3 As Float //Declare WidthRoom4, LengthRoom4 As Float //Declare TotalHouseSquareFeet As Float Write “This program will help you calculate...

Words: 273 - Pages: 2

Free Essay

Assignment1

...Terry Addison Course: IT-550 Kaplan University September 28, 2014 TABLE OF CONTENTS ABSTRACT 3 UNIT 1 Assignment 4 Introduction Terrorist Security Breach of a Network in Large Corporations What constitutes a cyber-terrorism case? Evidence related to cyber-terrorism and its meaning E-Discovery Process Conclusion 10 REFERENCES 11 Abstract This document discusses security breach at a large commercial corporation. It talks about what constitutes a cyber- crime. It also identifies the threats these important items are subject to It includes the meaning behind different types of evidence related to cyber-crimes and provides a description of the actual e-discovery process to be taken using forensics tools and techniques. Introduction At the point when a wrongdoing is perpetrated and the time it now, time for proof to be gathered guidelines and methods must be taken after to keep up equity inside the privileges of the criminally charged and the individuals who are on the arraigning side. To do this precisely and inside the extent of the law everything must be archived from the time it is seized to the time the proof found is displayed in court. Inside this documentation a rundown of all areas it was held, individuals who had admittance to it and any changes or tests utilized on the proof and by whom should likewise be recorded. The initial phase in assembling any sort of proof is seizing the confirmation from the spot or spots the wrongdoing...

Words: 2461 - Pages: 10

Premium Essay

Assignment1

...Fiber Optic Connector Identification Sheet The following photos will assist you in identifying the Fiber Optic connector types used to terminate each end of a fiber optic cable. Fiber optic patch panels are also presented in this document. Brazil Link: http://rdt1.tempsite.ws/html/poticos2.php?filtro=po US Link: http://www.siemon.com/us/ [pic] The above photo shows a duplex “LC” connector inserted into an SFP module in a Cisco 3750G-12S switch. [pic] Photo above represents a fiber optic “LC” connector patch panel in a 19 inch rack. [pic] Pictured above is a duplex “LC” fiber optic plug on the end of a patch cable. [pic] This photo depicts a simplex “SC” connector on a rack mounted fiber patch panel. [pic] The above picture depicts an integrated duplex “SC” jack on a Cisco 2900 XL switch. [pic] Illustration above denotes the fiber optic duplex “SC” connector in a patch panel within a 19 inch rack installation. [pic] The above photograph shows a duplex “SC” fiber optic plug on the end of a patch cable. [pic] The above picture shows a single “ST” fiber connector installed in a wall mounted patch panel. [pic] This picture displays two “ST” style fiber optic plugs. One for transmit the other for receive. Note the locking slots in the mounting ring. This is a bayonet coupling mount. Insert the connector into position and turn the locking cap a ¼ turn to lock it into place. [pic] The above picture denotes a wall mounted...

Words: 625 - Pages: 3

Premium Essay

Assignment1

...History of Dell Computers Michael Dell, Founder. Dell started business as a student in 1983. Company renamed Dell Computer in 1987. 1987 Dell Computers hit Fortune 500 in 1992. Became the leader of PC industry in the U.S. in 1999. Became the worldwide leader in PCs in 2001. Dell Inc. in 2005 Michael Dell, Founder of Dell Computers Products Dell’s principal products include: Desktop PCs Notebook computers Workstations Servers Printers Storage devices MP3 players LCD and Plasma TVs Digital cameras Memory cards … How Well has Dell been Performing? 2004 U.S. market share Global market share Revenue (millions) Gross profit Operating expenses Net income 33.10% 2003 30.90% 2002 27.90% 2001 23.50% 2000 19.70% 1999 16.60% 1998 13.20% 18.40% $41,444 $7,552 16.90% $35,404 $6,349 15.20% $31,168 $5,507 12.90% $31,888 $6,443 10.60% $25,265 $5,218 10.50% $18,243 $4,106 8.50% $12,327 $2,722 $4,008 $2,645 $3,505 $2,122 $3,718 $1,246 $3,780 $2,177 $2,955 $1,666 $2,060 $1,460 $1,406 $944 How Well has Dell been Performing? 2004 2003 2002 2001 2000 1999 1998 Dell Inc. Performance Market shares continue to grow, so do revenues and net profits. Able to maintain profit margins. Able to i in Abl t gain i operational efficiency. ti l ffi i Overall, a great company! U.S. share growth Global share growth 7.12% 10.75% 18.72% 19.29% 18.67% 25.76% 8.88% 11.18% 17.83% 21.70% 0.95% 23.53% Revenue growth Gross profit margin...

Words: 951 - Pages: 4

Free Essay

Assignment1

...MBA8000 ASSIGNMENT 1: Critical Reflection Due Date (12 April 2016) Word Limit (2,500) This assignment has three parts. In Part 1 you will describe an ethical dilemma that you had to face. In Part 2 you will analyze it. In Part 3 you will reflect on it. Part 1: Description (Word Limit = 500) Discuss an ethical dilemma that you have had to face in the workplace or at college / university. Give as much details as possible within the word limit. Please include the following: (You can replace the real names and places with fictional ones) * Describe the situation * Describe who was involved * Describe where the situation took place * Describe when it happened and what was going on.  * Describe the values and norms that were in conflict. * Describe your thoughts and feeling. * Describe what you did. (How was the dilemma resolved or what was the outcome?) * Rate your decision. On a scale from 1-10 how happy were you with your decision? (1 = Very unhappy 10= Very happy) and state why you thought that. Part 2: Analysis (Word Limit = 1,500) In this section you are going to analyze the ethical dilemma described in Part 1 above Please include the following: * Choose three of the normative ethical theories discussed in the course and use those three ethical theories to analyze the ethical dilemma described in Part 1. You should include critical thinking and use about 500 words with each one If you do not know how to analyze...

Words: 1002 - Pages: 5

Premium Essay

Ef3333 Assignment1

...Assignment1 1. A change in interest rate will affect the cost of borrowing, the income generated from tangible assets and stock’s value that the financial institution owns that will lead to profits or losses as a result. 2. The Federal Reserve’s Policies such as monetary policy could affect interest rates, inflation, and the supply of the money. These three factors are directly related to the profitability of financial companies. So the managers care so much about the Fed activities. 3. The family members are closed to you than a stranger. You could know the credibility of the family members but not the strangers. Under the asymmetric information, you can reduce the risk of being bad debt by borrowing the money to family members instead of the strangers. 4. The nominal interest rate=2%+6%=8%. At the end of one year, I will have $1080 in account ($1000*1.08). At that time, the stereo will sell for $1050*1.06=$1113. I don’t have enough money to buy it. I still need $33 ($1113-1180=$33) in order to buy it. 5. Years Cash payment PV OF CP Weights Weighted maturity 1 60 56.07 5.76 0.06 2 60 52.41 5.38 0.11 3 1060 865.28 88.86 2.67 973.73 Duration 2.83 The expected price changes if interest rate drops to 6.75%: %△P = -2.83*(-0.0025/1+0.07)=0.0066=0.66% 6. It will increase the interest rates if prices in the bond market become volatile,. Since the price volatility in bond market will increase the risks of investing bonds, the demand for bonds will fall...

Words: 377 - Pages: 2

Free Essay

Assignment1

...Problem Definition: The problem here is to calculate the usable area in square feet of house. We are to assume that the house has a maximum of four rooms, and that each room is rectangular. Problem Analysis Objective: Devise a program that calculates the usable area of a house. This is minimally what is being requested. • Outputs: This problem calls for a simple output, the total usable square foot of the house, with a maximum of four rooms, each room being rectangular. Total number of square foot = Area of Room1 + Area of Room2 + Area of Room3 + Area of Room4 • Inputs: The problem will require us to know the length and width of each of the four rectangular rooms in order to compute the correct output, the total number of square foot. The length multiplied by the width of each of the four rectangular rooms will give us area of each room. We will receive these data points by measuring the dimensions of the room. Length1 x Width1 = Area of Room1 • Calculation Approach: In order to calculate the Total Square Foot of the house, we will need to take the sum of the areas of each room. o Area of Room 1 = Length of Room1 x Width of Room1 o (Repeated four times – once for each room) o Total Square Foot of House = Area of Room1 + Area of Room2 + Area of Room3 + Area of Room4 • Define variables: AreaofRoom1 = square foot area of the room 1 AreaofRoom2 = square foot area...

Words: 928 - Pages: 4

Free Essay

Assignment1

...College of Business, Hospitality and Tourism Studies School of Accounting Com 501 Communication Literacy Trimester 3, 2015 Assignment 2- Critical Review Name: Devika Chand Id: 2015131951 Tutorial Group: 2 BIBLOGRAPHY DETAILS Review: Vijayakumar, L., 2004. Suicide prevention: the urgent need in developing countries. World Psychiatry, 3(3), pp. 158-159. Suicide prevention: the urgent need in developing countries Any death caused by disease or old age is natural and may not be accounted for any thriller to anyone (Palmer, 2009). It may be plaguing to know death which might had occurred due to unusual ways as these deaths could be stopped. There are no doubt of unnatural death over the world as social media usually highlights these in their broadcast over the air, television and even social networking sites such as Facebook. One of many unnatural death is suicide which may be a rising issue in developing countries as highlighted by Lakshmi Vijayakumar in her journal article Suicide prevention: the urgent need in developing countries. In her article, majority of the suicide occur in developing countries and major target countries are India and Chaina. Furthermore, when comparing the age group people who commit sucide in developed counties are between 15 to 25 year or elderly but developing countries the target group are married women and people below age of 30 years. Lakshmi Vijayakumar’s article also reveals method used for sucide in developing countries...

Words: 1202 - Pages: 5

Premium Essay

Assignment1

...Financial Management Decisions COST-VOLUME-PROFIT ANALYSIS 2.2 Cost Of Capital This Section includes : • Cost of Capital-Key Concepts • Importance • Classification • Determination of Cost of Capital • Computation • Weighted Average Cost of Capital INTRODUCTION: It has been discussed in lesson -4 that for evaluating capital investment proposals according to the sophisticated techniques like Net Present Value and Internal Rate of Return, the criterion used to accept or reject a proposal is the cost of capital. The cost of capital plays a significant role in capital budgeting decisions. In the present lesson the concept of cost of capital and the methods for its computation are explained. COST OF CAPITAL-KEY CONCEPTS: The term cost of capital refers to the minimum rate of return a firm must earn on its investments. This is in consonance with the firm’s overall object of wealth maximization. Cost of capital is a complex, controversial but significant concept in financial management. The following definitions give clarity management. Hamption J.: The cost of capital may be defined as “the rate of return the firm requires from investment in order to increase the value of the firm in the market place”. James C. Van Horne: The cost of capital is “a cut-off rate for the allocation of capital to investments of projects. It is the rate of return on a project that will leave unchanged the market price of the stock”. Soloman Ezra:”Cost...

Words: 3455 - Pages: 14

Premium Essay

Cis329 Assignment1

...I.T Consultation For Mr. Green CIS 329 – Administering Desktop Clients August 11, 2013 Mr. Green has decided to implement a network within his small business. This is a good choice in moving forward with his growing operations and size. He has several questions, and already has a few opinions about how he will go about this implementation, including both the software and hardware involved. My job as a private computer consultant will be to clarify some of the common misconceptions made by Mr. Green, and ensure that his network implementation will allow him to reach the goals he has as a small business owner. Mr. Green does not seem to have any interest in a Windows-based server up-front, meaning he will have to use the sharing or home group capabilities found within each computer’s operating system. Mr. Green needs to take into account the fact that Windows 7 Ultimate has little to no benefit over Windows 7 Professional as far as networking is concerned. The only added features he will get with Ultimate include the pre-installation of extra languages, and a service called Bit Locker. Bit Locker is an encryption software similar to an array of open source alternatives found on the internet, so if Mr. Green does not employ non-English speaking employees, he can save a good bit of money buying Windows 7 Professional. With Windows 7 Professional, he also maintains the ability to connect to a domain network if he was to purchase a real...

Words: 1249 - Pages: 5

Premium Essay

Mkw3444 Assignment1

...1.0. Introduction Chatime is one of the biggest milktea manufacturers in Taiwan. Chatime was first introduced in 2003.Chatime strategy by combining both high quality tea with Taiwanese bubble pearl bring a big success to Chatime and makes it becomes the market leader of milktea drinks in several countries. The success of Chatime can be seen by it has so many outlets, 800 franchises, all around the world. They are Taiwan, Malaysia, Indonesia, US, Uk, Australia and 12 other countries besides South Africa. Chatime has so many flavors for the tea drinks provided to the consumers with unique taste, fresh brewed tea and fresh ingredients. As Chatime decided to introduce its products to the worldwide by becoming a “Global brand with local flavor”, Chatime needs to makes the products with local tastes and meet the cultures in every country. In home country market, Taiwan, The demand for Chatime can be considered high. It is supported by the level of income of Taiwanese people is quite high and the good taste of Chatime products as well. The booming of milktea drinks factor also become the factors why Chatime drinks demand is very high. Since Chatime still does not have the outlets in South Africa, Chatime needs to considerate to open the market in South Africa to expand the business. As now South Africa is a very fast developing. Besides that, there is a local brand tea in South Africa named rooibos which is very popular for South African people. The report from Euromonitor International...

Words: 2725 - Pages: 11