StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cover Memo for two messages attached - Assignment Example

Cite this document
Summary
To perform the task, I will give an in-depth rhetorical analysis of Message 4: Direct Approach, and Message 5: Indirect Approach. A part from…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
Cover Memo for two messages attached
Read Text Preview

Extract of sample "Cover Memo for two messages attached"

Cover Memo Deborah Hart Faisal Alsuwailem November 10, Rhetorical Analysis of the Messages This is to inform you that I am planning to give an analysis for two of the six revised short messages that I had written earlier. To perform the task, I will give an in-depth rhetorical analysis of Message 4: Direct Approach, and Message 5: Indirect Approach. A part from highlighting with examples, the rhetorical strategies used in the messages, I will go ahead to give reasons and effects of their use in the messages.

In Message 4, I decided to make a good use of ethos, pathos and logos appeals to help in delivering my message to the intended audience. These were very useful in establishing ethical, pathological and logical appeals to the audience. For instance, ethical and logical appeals was created when I used the statement ‘We are a team of 55 marketing and media and professionals, and ‘Provide us with approximately 5o rooms and 2 conference rooms.’ These enabled us to captivate the attention of our audience to actually believe in us as credible persons who were serious about visiting the facility.

Besides, I used the strategy of first person narration. As part of the team making inquiry, I had to speak on behalf of my team. Thus, I often used ‘I’, ‘we’ and ‘us’ appropriately. This made it much easier for me to communicate my message and appeal to my audience. Meanwhile, in Message 5, I used the strategy of courtesy when addressing my audience. This simply means the use of polite language in my communications. Even if the message was being written as protest of a poor quality work done to us, I decided to humble myself before my audience.

These were evidenced in statements such as ‘We felt fortunate for your company to install an iron gate for one of our business tenants,’ ‘We were glad to transact with your company as it had provided us with a one year warranty for the gate’ and ‘We kindly ask you to send your team to inspect the gate and remedy the problem as soon as possible.’ I had to opt for this strategy because it convinces the audience. Indeed, it made me to win the confidence and attention of my audience whose services would be essential to us.

On the other hand, I used appropriate vocabularies in my message. As a business communication, I knew that I would have to use terms and jargons such as transact, warranty, inspect and remedy. Their relevance made to be up to the context of my communication. Faisal Alsuwailem.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cover Memo for two messages attached Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Cover Memo for two messages attached Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/business/1665193-cover-memo-for-two-messages-attached
(Cover Memo for Two Messages Attached Assignment Example | Topics and Well Written Essays - 250 Words)
Cover Memo for Two Messages Attached Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/business/1665193-cover-memo-for-two-messages-attached.
“Cover Memo for Two Messages Attached Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/business/1665193-cover-memo-for-two-messages-attached.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cover Memo for two messages attached

Study of Cyber Attacks

I'd like to begin by clarifying that there are two reasons for our susceptibility to malicious software.... The first is the presence of holes and security vulnerabilities in both our operating system and our hardware.... The second is the very nature of our identity as a profit-making company....
8 Pages (2000 words) Essay

The Gulf of Tonkin incident

It was triggered by attacks on two US warships USS Maddox and the USS Turner Joy.... The Gulf of Tonkin incident is described as the beginning of large scale involvement of America in the Vietnam War.... These attacks took place on 2nd and 4th of August 1964 in the Gulf of Tonkin. … After the end of World War II the alliance between United States, Britain, and USSR ended....
11 Pages (2750 words) Essay

The Concept of Event Marketing

The field of event management has increased in size and impact globally to become a major business with numerous dedicated facilities.... This esay highlights the marketing plan for the event and evaluates and analyzes the marketing mix for the launch.... … This essay focuses on marketing plan creation for the event....
11 Pages (2750 words) Essay

Email and Internet Usage Policies

Health care staff within the organization are encouraged to print pertinent emails regarding patient status, attach them to patient records, then delete messages.... All messages are automatically deleted after 3 days.... Archiving of email messages is discouraged, as it poses a risk of patient information falling into the wrong hands, though the risk is slim....
4 Pages (1000 words) Essay

The Hairstyling Industry in the UK

This paper "The Hairstyling Industry in the UK" presents present a thematic analysis concerning the working experiences of two hairstylists in the UK.... Each hairstylist represents one kind of salon classified according to size: from a small independent salon versus that from a large chain salon....
8 Pages (2000 words) Case Study

Technical writing

I feel highly disappointed when I say that the company management has We are looking into the matter, and are fully aware of the staff members from whose email accounts the messages originated.... I have just been informed by the HR department that our organization has won an ‘Employee Excellence Award'....
4 Pages (1000 words) Essay

Human Resources Policy and Guideline implementation to MEGlobal

This research is being carried out to evaluate and present Human Resources Policy and Guideline implementation to MEGlobal.... In any organization, employees' welfare is must be safeguarded and employers must seek to ensure that the working environment is conducive for all.... hellip; The main problem, in this case, is hygiene in the organizational setting....
9 Pages (2250 words) Case Study

Biography of Mark Zuckerburg

Noting the queer interests, his father took charge and taught the young lad the basics, the Atari BASIC Programming inclusive; the latter of which he used to develop “ZuckNet,” a messenger program that allowed the exchange of messages between their house and his father's clinic (Furgang, 2013).... nbsp; … The second born in a well-educated family, Zuckerberg was born on May 14, 1984, and raised in the suburbs of New York, Dobbs Ferry together with his three sisters Arielle, Randi and Donna by two able parents, Edward Zuckerberg, a dentist by profession, and Karen who worked as a psychiatrist (Kirkpatrick, 2010)....
5 Pages (1250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us