SlideShare uma empresa Scribd logo
1 de 12
 Get to the point
You have to get to your point right away
  your boss doesn’t have a lot of time for
  everything you have to say
  Don’t use caps locks
If you use caps lock the person you are
   talking to will think your yelling at them
 Use correct grammar and punctuation
You need to use correct grammar so who
  your talking to gets what you are trying
  to say
 Show your subject
You have to show what your talking about
  on the outside of the email to
 Be professional
You have to be professional if you aren’t
  you wont be treated respectfully in your
  reply
Don’t criticize through email
Don’t argue through email if you need to
 do it face to face
 Make sure they reply fast if it is important
You have to say something on the title of
  your email if you need them to respond
  quickly
Don’t send chain letters
Don’t send chain letters your boss or friends
 probably don’t have time for nonsense
 Proof read it before you send
Proof read it before you send people don’t
  want to have errors in emails or
  documents
 Don’t reply to all
Don’t reply to all you just need to reply to the
  person who sent you the email, people
  don’t need junk mail in their in box
   http://youvegotmail.warnerbros.com/ you’ve got mail
   http://ouraussiehalf-dozen.blogspot.com/2012/08/the-pencil-
    experiment.html pencils you’ve got mail
   http://home.howstuffworks.com/home-improvement/household-
    safety/security/lock.htm lock
   http://www.lessonsfromthecockpit.com/blog/2009/1/31/who-stole-the-go-
    signs.html go sign
   http://www.brucelittlefield.com/2012/02/life-101-the-notebook notebook
   http://depositphotos.com/4726868/stock-photo-African-American-
    Businessman-Walking.html businessman
   http://www.officepolitics.com/advice/?p=269 penguins
   http://newspaper.li/fast/ Runner
   http://chuckgreaves.com/monthly-post/the-unbroken-chain/ chains
   http://www.cartoonclipart.com/cartoon_clipart_images/girl_or_child_readin
    g_a_book_0515-1002-0104-0834.html girl reading
   http://www.more4kids.info/ kids around the world

Mais conteúdo relacionado

Mais de St John

Email ettiqute
Email ettiquteEmail ettiqute
Email ettiquteSt John
 
Email Etiquette project
Email Etiquette projectEmail Etiquette project
Email Etiquette projectSt John
 
Top 10 Email Etiquette
Top 10 Email EtiquetteTop 10 Email Etiquette
Top 10 Email EtiquetteSt John
 
Email ettiquette
Email ettiquetteEmail ettiquette
Email ettiquetteSt John
 
Proper Email Etiquette
Proper Email EtiquetteProper Email Etiquette
Proper Email EtiquetteSt John
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email EtiquetteSt John
 
Kayla!!! email etiquette
Kayla!!! email etiquetteKayla!!! email etiquette
Kayla!!! email etiquetteSt John
 
Proper email etiquette
Proper  email etiquetteProper  email etiquette
Proper email etiquetteSt John
 
Email ettique te
Email ettique teEmail ettique te
Email ettique teSt John
 
Olivia proper email etiquette.pptx
Olivia proper email etiquette.pptxOlivia proper email etiquette.pptx
Olivia proper email etiquette.pptxSt John
 
Email ettiqute
Email ettiquteEmail ettiqute
Email ettiquteSt John
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email EtiquetteSt John
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email EtiquetteSt John
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email EtiquetteSt John
 
Good Email Etiquette matt
Good Email Etiquette mattGood Email Etiquette matt
Good Email Etiquette mattSt John
 
Email Etiquette for Students
Email Etiquette for StudentsEmail Etiquette for Students
Email Etiquette for StudentsSt John
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email EtiquetteSt John
 
Ten Rules for Email
Ten Rules for EmailTen Rules for Email
Ten Rules for EmailSt John
 
Kindergarten Night 2010
Kindergarten Night 2010Kindergarten Night 2010
Kindergarten Night 2010St John
 
Cell Phone Arguement... Luke
Cell Phone Arguement... LukeCell Phone Arguement... Luke
Cell Phone Arguement... LukeSt John
 

Mais de St John (20)

Email ettiqute
Email ettiquteEmail ettiqute
Email ettiqute
 
Email Etiquette project
Email Etiquette projectEmail Etiquette project
Email Etiquette project
 
Top 10 Email Etiquette
Top 10 Email EtiquetteTop 10 Email Etiquette
Top 10 Email Etiquette
 
Email ettiquette
Email ettiquetteEmail ettiquette
Email ettiquette
 
Proper Email Etiquette
Proper Email EtiquetteProper Email Etiquette
Proper Email Etiquette
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Kayla!!! email etiquette
Kayla!!! email etiquetteKayla!!! email etiquette
Kayla!!! email etiquette
 
Proper email etiquette
Proper  email etiquetteProper  email etiquette
Proper email etiquette
 
Email ettique te
Email ettique teEmail ettique te
Email ettique te
 
Olivia proper email etiquette.pptx
Olivia proper email etiquette.pptxOlivia proper email etiquette.pptx
Olivia proper email etiquette.pptx
 
Email ettiqute
Email ettiquteEmail ettiqute
Email ettiqute
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Good Email Etiquette matt
Good Email Etiquette mattGood Email Etiquette matt
Good Email Etiquette matt
 
Email Etiquette for Students
Email Etiquette for StudentsEmail Etiquette for Students
Email Etiquette for Students
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
Ten Rules for Email
Ten Rules for EmailTen Rules for Email
Ten Rules for Email
 
Kindergarten Night 2010
Kindergarten Night 2010Kindergarten Night 2010
Kindergarten Night 2010
 
Cell Phone Arguement... Luke
Cell Phone Arguement... LukeCell Phone Arguement... Luke
Cell Phone Arguement... Luke
 

Último

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Último (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

How To Have Great Email Etiquette

  • 1.
  • 2.  Get to the point You have to get to your point right away your boss doesn’t have a lot of time for everything you have to say
  • 3.  Don’t use caps locks If you use caps lock the person you are talking to will think your yelling at them
  • 4.  Use correct grammar and punctuation You need to use correct grammar so who your talking to gets what you are trying to say
  • 5.  Show your subject You have to show what your talking about on the outside of the email to
  • 6.  Be professional You have to be professional if you aren’t you wont be treated respectfully in your reply
  • 7. Don’t criticize through email Don’t argue through email if you need to do it face to face
  • 8.  Make sure they reply fast if it is important You have to say something on the title of your email if you need them to respond quickly
  • 9. Don’t send chain letters Don’t send chain letters your boss or friends probably don’t have time for nonsense
  • 10.  Proof read it before you send Proof read it before you send people don’t want to have errors in emails or documents
  • 11.  Don’t reply to all Don’t reply to all you just need to reply to the person who sent you the email, people don’t need junk mail in their in box
  • 12. http://youvegotmail.warnerbros.com/ you’ve got mail  http://ouraussiehalf-dozen.blogspot.com/2012/08/the-pencil- experiment.html pencils you’ve got mail  http://home.howstuffworks.com/home-improvement/household- safety/security/lock.htm lock  http://www.lessonsfromthecockpit.com/blog/2009/1/31/who-stole-the-go- signs.html go sign  http://www.brucelittlefield.com/2012/02/life-101-the-notebook notebook  http://depositphotos.com/4726868/stock-photo-African-American- Businessman-Walking.html businessman  http://www.officepolitics.com/advice/?p=269 penguins  http://newspaper.li/fast/ Runner  http://chuckgreaves.com/monthly-post/the-unbroken-chain/ chains  http://www.cartoonclipart.com/cartoon_clipart_images/girl_or_child_readin g_a_book_0515-1002-0104-0834.html girl reading  http://www.more4kids.info/ kids around the world