Question

If you have a concise message and you would like to send it in email. What...

If you have a concise message and you would like to send it in email. What is the simplest
method you can use that do not force the recipient to open your email?

Homework Answers

Answer #1

The simplest method is to send the concise message as subject line so recipient can directly read the message in subject line and no need to open mail.

Example: Concise message is "EE meeting tomorrow at 9 am" so we can directly send it as subject line as follows in email.

Subject- EE meeting tomorrow at 9 am

In this way , the message will be communicated to recipient just by reading subject line and no need to open the mail.

We can also use EOM (End of message) at the end of subject line to make it clear to recipient that required short message is communicated and no need to open email.

Subject - EE meeting tomorrow at 9 am .EOM

We can use EOM provided the recipient knows its meaning i.e. End of message.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
4. Write an Email: Assume you have just completed an interview for a new job. Send...
4. Write an Email: Assume you have just completed an interview for a new job. Send an email thanking the person you met. Be sure to reiterate any points that you want the interviewer to remember about you and your skills. Your submission should include all elements of the email: Address, Subject Line, Salutation, and Signature Block. You can compose this on your computer and copy and paste a screen shot in a Word document, or compose it in a...
Let’s assume the following message is an email. Read it and (1) Analyze the strengths and...
Let’s assume the following message is an email. Read it and (1) Analyze the strengths and weaknesses of the following text [write a detailed analysis of about 1 single-spaced page long] (2) Revise the document so that it follows chapter 8’s (pp. 273-288)* guidelines [rewrite the following text so that you end up with an improved version] SUBJECT: Negotiator Pro At a local business-supply store, I recently purchased your Negotiator Pro for my computer. I bought the CD because I...
2. Consider an unreliable communication channel that can successfully send a message with probability 1/2, or...
2. Consider an unreliable communication channel that can successfully send a message with probability 1/2, or otherwise, the message is lost with probability 1/2. How many times do we need to transmit the message over this unreliable channel so that with probability 63/64 the message is received at least once? Explain your answer. Hint: treat this as a Bernoulli process with a probability of success 1/2. The question is equivalent to: how many times do you have to try until...
Discuss how a router knows where to send a message and then any experience you might...
Discuss how a router knows where to send a message and then any experience you might have setting one up. In your opinion what are the challenges in establishing a network connection between two points over a large distance? Describe your own knowledge of this network configuration.
Suppose that you have received 100 email messages 90 of which are genuine and 10 are...
Suppose that you have received 100 email messages 90 of which are genuine and 10 are spam. Suppose that your email server runs a spam filtering software that classified the above email messages as follows. • Out of the the 90 genuine messages 88 classified as genuine but 2 are wrongly flagged as spam. • The probability of correct classification of a message is at least 97% Using the above data, please answer the three questions below. Each answer must...
You have been asked to create a spear phishing email that will entice the faculty and...
You have been asked to create a spear phishing email that will entice the faculty and staff of the Trent University Forensics Department into visiting your website, which is configured to automatically install malware on their computers. What planning would you do prior to sending the email? Write the contents of the email. Why do you think that this would be an effective phishing attack?
Hello! I would like to ask you idea of writing in business! Thank you so much!...
Hello! I would like to ask you idea of writing in business! Thank you so much! Prompt on the below. Creating Inter-Office Email. Inter-Office Email Setting: You are the Communications Coordinator for CVS.  CVS is currently assessing its communication practices with its 200 vendors using an online survey.  CVS and its stores are spread all throughout the United States of America. Instructions: You have been tasked with persuading the vendors to complete the survey.  It is not a mandatory survey, so you must...
If you don't have a LinkedIn profile, don't want to create a LinkedIn profile, or don't...
If you don't have a LinkedIn profile, don't want to create a LinkedIn profile, or don't want to connect on LinkedIn, that's okay - you can still earn the participation marks. Use email as a prospecting tool and send a brief email introducing yourself. Imagine that you are a sales rep for Canon and I am a potential client. You would like to meet with me to tell me about yourself and your company and assess my copier needs.
When you read this email, you'll know it was sent in anger. What went wrong? How...
When you read this email, you'll know it was sent in anger. What went wrong? How would the audience (university employees) likely have reacted to this message? What was the intended communication objective? Did it likely achieve that objective? 1. Think about these issues carefully and rewrite the email message below, keeping in mind the 6 rules for writing effective emails. The request is legitimate, but the tone and approach are not.   Also, consider the timing. How much time will...
The sender -encode-message-decode-recipient model and the noise that it may encounter along the way are considered_________...
The sender -encode-message-decode-recipient model and the noise that it may encounter along the way are considered_________ Incomplete communication (talking without response) Linear communication (talking at your audience) Cyclical communication (talking with your audience) The guidelines for ethical communications start with_____. The list provided by the international Association of Business Communicators The seven principles of effective communication Being clear and concise in communication If you fact check your internet research and indicate the sources from which the information came, you are...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT