The learner will study an effective workplace email being written while a narrator explains the step-by-step process. The learner will distinguish the difference between poorly written and effectively written emails.
In this interactive lesson, learners read and hear instructions for sending an e-mail. Steps are given for composing an e-mail message and for sending it. Students have an opportunity to write their own messages. A quiz follows the instruction.
Learners listen to effective techniques to successfully interact with customers via the telephone. They also submit their own suggested replies to customers in various scenarios. Topics include general telephone etiquette, dealing with angry callers, working with confused or unsure customers, and managing voicemail. A quiz completes this customer service activity.
Students read about the different kinds of economic interest groups including business and trade associations, labor unions, agricultural organizations, and professional associations.
In this learning activity you'll analyze a scenario using operant conditioning. (For security reasons, the ability to email results to your instructor at the end of the lesson has been disabled)
Learners complete a crossword puzzle with terms that relate to common diseases and disorders of the blood. Immediate feedback is provided. Learners have the option to send an e-mail to their instructors notifying them that the learning object has been completed.
In a series of interactive exercises, learners identify the parts of a URL, a Web site, and an e-mail memo. Students are given their score at the end of the activity.
Transactional Communication Model: Assessment Activity
In this learning activity you'll outline a conversation using the transactional communication model. The print and Email function has been disabled. You may take a screenshot of the last screen if needed.
You will encounter real-world challenges that mimic what IT professionals face in day-to-day operations, providing hands-on experience with resolving TPM errors.
In this learning activity you'll explore how port scanning is commonly used by hackers to infiltrate a network and how IT security professionals can detect it.
Learners read about the types of clothing considered appropriate for a school setting. This activity is designed for students enrolled in an instructional assistant program.