0% found this document useful (0 votes)
40 views8 pages

CMNS 1291 - Assignment 1

CMNS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views8 pages

CMNS 1291 - Assignment 1

CMNS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

CMNS 1291 - Assignment 1

5 Activities I’ll be doing:

Module 2: Activity 3: Profile an Audience


Example: “The Power of Vulnerability” by Brene Brown

Source: https://www.youtube.com/watch?v=iCvmsMzlF7o

1. What are the receiver’s responsibilities and position?


The receivers (audience members) are in control of engaging. They are those who listen
and share the content produced by Brene Brown. They must be open and modest and they
should think of their own encounters with sensitivity. Audience, according to what they
have learned and what they are engaged with, will look at the issue in different ways.
Thus, a student may have a different stance from a professional or an individual who is
simply looking for personal development as far as one’s engagement on an issue goes.
2. What are the receiver’s attitudes , interests, and questions?
Attitudes: The audience usually has an appreciation toward self-improvement and mental
health problems. They may be fascinated or concerned by the idea of exposure.
Interests: The audience is interested in emotional intelligence, personal development, and
improving relationships. They may also explore ways to overcome fear and
embarrassment. Common questions might include: How can I be more vulnerable in my
life?
What are the practical steps for embracing exposure?
How does vulnerability enhance relationships?
3. What is your experience with the receiver?
As an author (or speaker), your interaction with the receiver is based on a common
interest in growth and mental well-being. Brene Brown probably communicated the same
subject to others in the past through her writings, talks, and research and by doing that
establishing credibility and trust.
4. How much does the receiver know about the subject?
The audience probably knows only part of the vulnerability concept but not the whole
etiology of it and this is its crowded involvement in human interaction as expounded in
the session. Some people, as the case may be, may have read the literature of Brown or
watched her previous talks while others may be novel in the subject.
5. What is the receiver’s likely response?
The range of possibilities constitutes either a higher awareness and a wish to be more
straightforward or a negative reaction often by way of fear or dislike. It should encourage
CMNS 1291 - Assignment 1
a lot of individuals to try the ideas out by themselves and maybe talk about their own
experiences of vulnerability.
6. What words define your relationship with the receiver?
The relationship is defined by words such as trustworthy motivating, relatable, and
supporting, Brene Brown aims to engage with her audience on a personal level, creating a
community of shared knowledge and progress.
7. Is there more than one receiver?
Yes, there are many recipients, including people of different nationalities, ages, and life
experiences included. This diversity might affect the way the talk is perceived as every
person reacts differently toward the different sensitive aspects.
8. Do you need to adapt your message for an international receiver?
While the underlying notion of exposure is common, cultural differences might influence
how the concept is understood. To enhance relevance and understanding for international
audiences, examples and terminology may need to be adapted taking into account cultural
circumstances surrounding vulnerability and emotional expression.
9. Does the receiver have any particular expectations?
The recipient expects an entertaining, informative, and relatable message that provides
practical guidance and promotes personal introspection. They seek honesty and a
connection to their personal experiences, as well as practical measures to embrace
vulnerability in their lives.

Module 2: Activity 7: Planning Decisions behind a Document


a. Purpose
The primary purpose of Howard Schultz’s letter is to apologize for the incident
that occurred in Starbucks in 2018 and to assure customers that actions are being
done to improve and avoid similar problems from occurring again.
b. Scope
The scope of Howard Schultz’s letter might point out the specific incident that
occurred in Starbucks, how they are handling the situation, and their plans to make
the changes to solve the problem. But the main scope is customer reassurance into
telling them about how Starbucks is addressing this issue.
c. Audience
The audience for Howard Schultz’s letter is for Starbucks customers, but
specifically people who are highly aware of the incident. He would mainly address
people who feel negative about this issue, or are hurt and highly upset about what
happened, so his messages would feel a bit emotional and that he would want to
regain trust, be compassionate, truthful, and reassuring.
CMNS 1291 - Assignment 1
d. Channel
The channel in Howard Schultz’s letter is most likely a public letter, which is
posted on Starbucks website for people to view and see what the author has done
and that he would want his readers to understand what he is trying to tell them.
This may even be shared on various platforms. This can easily be accessed online
to many people who can view his message and be informed about the incident that
occurred in Starbucks.
Message I Got from email:
Hi, Aisha!
It's our favorite time of the year—the 2024 State of PostgreSQL survey is now open!
Your input is invaluable in helping us understand our community's evolving needs, so
don't miss the chance to participate and check out last year’s key findings.
For those diving into advanced database applications, we’ve got a range of tutorials and
benchmarks that explore the intersection of PostgreSQL with cutting-edge technologies.
Learn how to implement filtered semantic search with pgvector and JavaScript, build
fully local RAG apps with Mistral and Ollama, and optimize your data ingestion
strategies with our in-depth performance comparisons, among many more educational

resources and tutorials.


Finally, don’t miss our featured podcast appearance, in which Avthar Sewrathan,
Timescale’s AI Lead, discusses the evolving role of PostgreSQL in the GenAI and vector
database landscape with the StackOverflow podcast team. It’s well worth a listen!

See you soon!


P.S. In case you missed it, the most clicked link in the previous edition was
Recommendations for Setting Up Your Architecture With AWS and TimescaleDB.

Primary purpose: The intent of this message is delivering the desired number of
articles that will continue to the subscribers’ interest as per their attractions to a
featured podcast appearance about the role of PostgreSQL in vector databases and
CMNS 1291 - Assignment 1
artificial intelligence, an invitation to participate in the 2024 State of PostgreSQL
survey, and an educational tutorial.
Scope: The scope includes these three main components: Submission of a
remainder on the PostgreSQL survey of 2024. A referential name of benchmark
tutorials for PostgreSQL or new technologies. A suggestion for the podcast episode
where the topic will be about how PostgreSQL is becoming more and more crucial
in vector databases and artificial intelligence. It is from a previous well-liked article
in the newsletter edition that will be highlighted by my postscript.
Audience: Most often, the target audience of such messages are those who are
already part of the developers, technical experts, or the PostgreSQL community.
They want to prepare themselves with instructional resources and catch up with the
latest technologies while using advanced database applications. The content in the
message shows that I am a participant in this community.
Channel: The message is sent by email, which is frequently used to communicate
with the community and reach a specific audience with newsletters or updates.
Email is a useful tool for direct communication, including information sharing such
as podcasts and tutorials, as well as calls to action (participate in surveys).

Module 4: Activity 8: Write Instructions for Online Readers


My instructions for online readers is to learn how to make pancakes.
The purpose of my message is to teach my readers to make a quick, easy, and delicious
breakfast for everyone to enjoy and to serve for themselves and others. Here are the
instructions on how to make pancakes.

Ingredients Needed:
● 1 cups of all-purpose flour
CMNS 1291 - Assignment 1
● 1 teaspoon of baking powder
● 1 tablespoon of sugar
● A pinch of salt
● ½ teaspoon baking soda
● 1 large egg
● 1 cup milk
● Butter or cooking spray

Step-by-Step Instructions:

1. Prepare the Dry Ingredients


In a large bowl, mix the ingredients listed below:
● 1 tablespoon of sugar
● 1 cup of flour
● ½ teaspoon of baking soda
● 1 teaspoon of baking powder
● A pinch of salt
2. Prepare the Wet Ingredients
In a separate bowl:
● Beat the egg gently
● Add 1 cup milk
● Add two tablespoons of heated butter or oil and stir
3. Combine Wet and Dry Ingredients
● Combine the wet and dry ingredients by pouring them together
● Gently stir until fully incorporated
4. Heat the Pan
● Set the stove over medium heat
● Place the pan over medium heat
● Spread butter or oil to coat the pan
5. Cook the pancakes
● For one pancake, use around ¼ cup of pancake batter in the pan
● Cook for two to three minutes, or until bubbles appear on the batter
● When the pancake is ready, turn it over and cook it on the other side.
6. Serve and Enjoy!
CMNS 1291 - Assignment 1
● Serve the pancakes with great toppings like butter, syrup, or fresh fruit.

Tips for Perfect Pancakes


● Don't overmix: Stir enough to combine all the ingredients together.
● Check the heat: Just to make sure they don’t overcook.
● Add extras: Adding extra toppings would make the pancakes more tastier.
However, this is optional.

Module 5: Activity 5: Use a Checklist to Analyze Unwelcome News

Source:https://www.doherty.co.uk/blog/data-breach-examples-rethink-your-data-strategy/

Message: Data breach example #3: Brighton and Sussex University Hospital

How many affected?

Figures are unclear, but 232 de-commissioned drives packed with patient data were
stolen.

What happened?

Brighton and Sussex University Hospital was fined £325,000 over the theft of thousands
of patient’s data. The sensitive information, which included medical results, were
reportedly put up for sale on ebay.

How?

The thief accessed the sensitive data by stealing hard drives that were supposed to have
been destroyed.

Is the cloud the solution?


CMNS 1291 - Assignment 1
While security is often the top reason IT professionals cite for avoiding the cloud, the
Brighton and Sussex Hospital breach shows just how insecure physical devices are if not
invested heavily. This disaster points to the cloud as a winning solution. By investing in a
secure cloud service, companies are not obliged to destroy external devices or risk having
data stolen in this manner.

Analysis Using Meyer’s “Chapter Review” Checklist:

1. Following Guidelines:

The message about the Brighton and Sussex University Hospital breach follows
the guidelines effectively. It provides clear and concise information about what has
happened, which describes the theft of patient data and the subsequent £325,000
penalties. The statement further explains how the breach unfolded (by the theft of
discarded hard drives), which is consistent with the policy of being upfront about
the situation. It also provides practical guidance, implying that employing cloud
services could prevent similar accidents in the future, so contextualizing the
problem and offering a viable solution.

2. Missing Guidelines:

The message lacks empathy for the victims of the hack, notably the patients whose
private information was compromised. The emphasis is on describing the technical
cause of the breach and the prospective benefits of cloud services rather than
dealing with the impact of affected persons. Including an apology or
acknowledgment of the patients’ particular concerns would have made the
message more empathetic and customer-oriented. In this example, the lack of a
human-centered approach is a squandered opportunity because it could have
contributed to regaining public trust.

Module 3: Activity 13: Find and Revise a Confusing Paragraph


Original: I don’t wanna say too much but if somehow you contact me, it says not to put
private information so I won’t. I think you know who I am though a buddy of mine is
over here for the week and he’s discussing what he saying because he could do things I
can’t, I think it’s OK developers can mod but they sent bragging and pushing people off
for the I’m just so tired. I honestly won’t not come back and it blank. You literally gave
me nothing all that money. I spent all the receipts are here. I’m staring at them if I put
CMNS 1291 - Assignment 1
them up here freak out, I even bought a car voucher. Figured it be worth the effort and
you take my money you keep offering me to buy this and that and protection it then you
expose my email you made it wrong. You know you did you deleted the chat I have it on
video. I have the guy who messed up everything on video admitting he messed up
because he has multiple accounts. If you do not reply, told me he gave you 10 hours. It
already went up. I’m trying to push them back, but his firm is watching you with her eyes
peeled, please respond

Revision: I don’t want to disclose too much personal information, but I’m frustrated with
the situation. A friend is visiting this week, and we’ve been talking about some problems
I’ve encountered. I understand that developers may modify software or features, but the
constant gloating and hostile behavior is exhausting. I am seriously considering not
returning after spending so much money, and I have all of the receipts to prove it. I even
bought a car certificate, believing it would be worth it. It feels like you’ve grabbed my
money while constantly pushing extra purchases and protection plans, but my email was
revealed due to an error on your part. I have video footage of a representative
acknowledging faults due to several accounts. If I don’t hear from you soon, the situation
will escalate, and a third party is closely monitoring the matter. Kindly answer.

Changes Made:
● Clarity and Conciseness: I removed repeating phrases and shortened the sentence
to make the communication clearer.
● Grammar and Punctuation: Added punctuation and corrected grammar errors
for a better flow
● Logical Flow: Organized the ideas in a more logical order, making it easier for the
reader to follow
● Professional Tone: Made the tone more professional, which is more effective in a
response.

You might also like