Preview

business comm

Good Essays
Open Document
Open Document
880 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
business comm
Assignment 1 – The Three-Step Writing Process
Instructions:
This assignment is divided into three parts, each corresponding to a step in the Three-Step Writing Process outlined in the course text book.

Read the Assignment Scenario.

Read the directions for each part of the assignment and complete the associated activities by typing in the space provided.

Save the file and submit to your instructor using the Blackboard assignment tool.

Assignment Scenario
Kevin Peters, owner and sole employee of a XTRMachines Computers Ltd., has a serious problem that could threaten his business.

Over the past 3 years, he has built a loyal customer base (numbering in the hundreds) by selling and servicing custom-built computers for high-end PC enthusiasts. One of the ways he has been able to provide excellent service to his clients is by collecting information on their purchases and storing it in a database. When new inventory related to his clients' past purchases becomes available, his system automatically sends a customized email message to the appropriate client inviting them to check the website or come in to the store for a demonstration. Recently, however, Kevin has discovered that a programming error has resulted in 47 email messages being sent to the wrong customers. Even worse, the messages included some personal information such as customers’ names, purchase histories, and shipping addresses.

Kevin has checked his email logs and knows exactly which customers received the incorrect messages and which customers' personal information was compromised. Many of them are repeat customers who have purchased several thousand dollars worth of equipment from XTRMachines. Kevin knows he must contact his clients but is unsure how best to communicate with them to minimize the risk of losing their future business.

Part 1 – Planning Business Messages
Answer the following questions based on the Assignment Scenario:

1. Who is the primary audience for this

You May Also Find These Documents Helpful

  • Good Essays

    DIRECTIONS: Use your packet by the same title as the assignment, the readings and your textbook to answer the following.…

    • 2154 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Data collection would be accomplished by the assigned individual who would screen the emails in the support distribution email box, then move all the misdirected emails to a separate email folder labeled “Misdirected” each day, then and there forwarding a copy to the correct department. The moving of the emails allows a total to be collected each day, so at the end of the week they would be totaled and recorded to measure the effectiveness of the new process. There was a study conducted using research from comparable organizations, using a similar process that concluded that we should have a benchmark of 1 misdirected email a week. Furthermore, we would need someone to monitor the total number of non-technical support request that come in to…

    • 736 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    “If it was intruders, they had been deep enough into IVK’s CRM production servers to rename database files, which meant they could have also stolen customer data or corrupted it subtly. Unfortunately, the company’s CRM database does retain Social Security numbers and other…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Mterm3

    • 317 Words
    • 2 Pages

    Instructions: Read chapter 3 in your textbook and review the lecture notes and study resources provided by your instructor. Type your answer in the answer block provided for each question. Answer blocks should expand as you type. If you experience difficulty typing in the provided answer blocks, you may type your answers in a new document. Save a copy of the completed activity to your computer for your records. Although this activity is not graded, your instructor reserves the right to require students to submit their completed work at any time throughout the semester.…

    • 317 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Identity theft occurs in some of the largest companies and often times this security breach is kept quiet. This company has been hacked for customer’s birthdates twice in one month. This means that they are experiencing severe vulnerabilities and they need to take action immediately. When customers start hearing that the companies they deal with have had security breaches in their computer systems data, they panic and most tend to, discontinue associating with that particular company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Read through all of the tasks carefully, so that you know what you will need to do to complete this assignment.…

    • 1187 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Chapter 3: Cells

    • 784 Words
    • 4 Pages

    Instructions: Read chapter 3 in your textbook and review the lecture notes and study resources provided by your instructor. Type your answer in the answer block provided for each question. Answer blocks should expand as you type. If you experience difficulty typing in the provided answer blocks, you may type your answers in a new document. Save a copy of the completed activity to your computer for your records. Although this activity is not graded, your instructor reserves the right to require students to submit their completed work at any time throughout the semester.…

    • 784 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Sandwich Blitz Inc.

    • 517 Words
    • 4 Pages

    Write your Assignment in paragraph form, using Microsoft Word. Your document should be at least 1…

    • 517 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Payton, A. M. (2006). Data security breach: seeking a prescription for adequate remedy. Proceedings of the 3rd annual conference on Information security curriculum development (pp. 162-167). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Doors

    • 304 Words
    • 3 Pages

    Answer the questions. When you are finished, submit this assignment to your teacher by the due date for…

    • 304 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Classical India and China

    • 1106 Words
    • 5 Pages

    Women’s rights deteriorated after the Vedic period (1600-800 BCE). No one has been able to prove why this happened. Scholarly interest has focused on women’s exclusion from performing Hindu rituals, which was in effect by 500 BCE…Julia Leslie thinks that women’s exclusion resulted from intentional mistranslation of the Vedas by male scholars, as the rituals became more complicated and as the requirement for property ownership was more rigorously enforced at a time when women could not own property.…

    • 1106 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Despite the fact that there are numerous state and federal reporting agencies, an incredible amount of businesses and regular personal computer users do not report incidents. Among businesses, specifically, ninety percent of cyber crime goes unreported while only two percent of those that are reported end in a conviction. Because businesses have so much of the population 's personal information, and their validity depends on the consumer 's ability to depend on and trust the business, the businesses find a larger risk in revealing that their computer systems are susceptible breaching than the actual loss from a cyber attack. Succinctly, the economic loss from consumer 's mistrust would create a financial loss more damaging than the cyber attack…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Business Management

    • 928 Words
    • 4 Pages

    1. Complete the table below with descriptions of at least two different features of a telephone system and how / when they would be used.…

    • 928 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    During Week 2, our team focused our collaborative discussion on different technologies that businesses can use to prevent security breaches and reduce the risk of cyber-attacks they are increasingly experiencing. To aid in our discussion, team member, Jennifer Ashton, posted an article entitled “The Right Technology Fix Can Help Prevent Breaches”, written by author, Tim Horton. Mr. Horton’s article remarked on the rising number of data breaches, how often they affect small businesses, and measures that organizations can employ to avoid future intrusions.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Jarvis, K., & Milletary, J. (2014, January 24). Inside a targeted point-of-sale data breach. Retrieved from http://krebsonsecurity.com/wp-content/uploads/2014/01/Inside-a-Targeted-Point-of-Sale-Data-Breach.pdf…

    • 1162 Words
    • 5 Pages
    Better Essays