Professional Documents
Culture Documents
Business Messages
Presented by Pawan Vijay
E-MAIL:- vijaypawan@in.com
PGPSE Student of AFTERSCHOOOL
AFTERSCHO☺OL
– DEVELOPING CHANGE MAKERS, CENTRE FOR SOCIAL
ENTREPRENEURSHIP PGPSE PROGRAMME –
World’ Most Comprehensive programme in social entrepreneurship &
spiritual entrepreneurship
OPEN FOR ALL FREE FOR ALL
www.afterschoool.tk
Business writing is . . .
• Purposeful. It solves problems and
conveys information.
• Economical. It is concise.
• Reader-oriented. It focuses on the
receiver, not the sender.
• Phase 2: Writing
Researching, organizing, composing
• Phase 3: Revising
Revising, proofreading, evaluating
Sender-focused Receiver-focused
“We are requiring all “Please complete
staffers to complete these forms so that
these forms in you will be eligible for
compliance with health and dental
company policy.” benefits.”
Sender-focused Receiver-focused
“Because we need “You can buy a year’s
more space for our supply of paper and
new inventory, we’re pay for only six
staging a two-for-one months’ worth during
sale.” our two-for-one sale.”
TO:
TO: All
All Employees
Employees Using
Using HP
HP 5000
5000 Computers
Computers
Your
Your cooperation
cooperation isis urgently
urgently needed
needed in
in solving
solving aa serious
serious
computer
computer security
security problem.
problem. ToTo enable
enable you
you to
to keep
keep your
your
files
files and
and those
thoseof
of the
the entire
entire company
company secure,
secure, please
please follow
follow
these
these two
two actions:
actions:
1.
1.Keep
Keep your
your password
password private.
private. Please
Please do
do not
not share
share itit
with
with anyone.
anyone.
2.
2.Log
Log on
on to
to the
the computer
computer manually.
manually. Avoid
Avoid using
using
automatic
automatic log-on
log-on procedures.
procedures.
. Submitted by Pawan, PGPSE Student of AFTERSCHOOOL
Activity 5.1
By
By refusing
refusing to
to share
share your
your password,
password, you
you prevent
prevent intrusion
intrusion
into
into your
your private
private files.
files. Automatic
Automatic log-on
log-on procedures
procedures areare
also
also dangerous.
dangerous. Although
Although they they seem
seem to
to save
save time,
time, they
they
give
give anyone
anyone access
access toto the
the entire
entire computer
computer system--even
system--even aa
person
person without
without prior
prior knowledge
knowledge of of your
your password.
password.
Please
Please sign
sign the
the attached
attached form
form and
and return
return itit to
to me
me indicating
indicating
that
that you
you are
are aware
aware of
of this
this urgent
urgent problem
problem and and are
are willing
willing
to
to avoid
avoid these
these two
two actions
actions inin your
your computer
computer use. use.
Attachment
Attachment
. Submitted by Pawan, PGPSE Student of AFTERSCHOOOL
End