Free Essay

Xxxxxxxxxxxxxx

In:

Submitted By taavi
Words 1088
Pages 5
File Transfer Protocol

File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host or to another host over a TCP-based network, such as the Internet.

FTP is built on a client-server architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves using a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that hides (encrypts) the username and password, and encrypts the content, FTP is often secured with SSL/TLS ("FTPS"). SSH File Transfer Protocol ("SFTP") is sometimes also used instead.

The first FTP client applications were command-line applications developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Dozens of FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into hundreds of productivity applications, such as Web page editors.

The original specification for the File Transfer Protocol was written by Abhay Bhushan and published as RFC 114 on 16 April 1971 and later replaced by RFC 765 (June 1980) and RFC 959 (October 1985), the current specification. Several proposed standards amend RFC 959, for example RFC 2228 (June 1997) proposes security extensions and RFC 2428 (September 1998) adds support for IPv6 and defines a new type of passive mode.

The protocol was first specified June 1980 and updated in RFC 959, which is summarized here.

The server responds over the control connection with three-digit status codes in ASCII with an optional text message. For example "200" (or "200 OK") means that the last command was successful. The numbers represent the code for the response and the optional text represents a human-readable explanation or request (e.g. <Need account for storing file>). An ongoing transfer of file data over the data connection can be aborted using an interrupt message sent over the control connection.

FTP may run in active or passive mode, which determines how the data connection is established. In active mode, the client creates a TCP control connection to the server and sends the server the client's IP address and an arbitrary client port number, and then waits until the server initiates the data connection over TCP to that client IP address and client port number. In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server,[7][6] which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received. Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.
While transferring data over the network, four data representations can be used:
ASCII mode: used for text. Data is converted, if needed, from the sending host's character representation to "8-bit ASCII" before transmission, and (again, if necessary) to the receiving host's character representation. As a consequence, this mode is inappropriate for files that contain data other than plain text.
Image mode (commonly called Binary mode): the sending machine sends each file byte for byte, and the recipient stores the bytestream as it receives it. (Image mode support has been recommended for all implementations of FTP).
EBCDIC mode: use for plain text between hosts using the EBCDIC character set. This mode is otherwise like ASCII mode.
Local mode: Allows two computers with identical setups to send data in a proprietary format without the need to convert it to ASCII

For text files, different format control and record structure options are provided. These features were designed to facilitate files containing Telnet or ASA

Data transfer can be done in any of three modes:
Stream mode: Data is sent as a continuous stream, relieving FTP from doing any processing. Rather, all processing is left up to TCP. No End-of-file indicator is needed, unless the data is divided into records.
Block mode: FTP breaks the data into several blocks (block header, byte count, and data field) and then passes it on to TCP.
Compressed mode: Data is compressed using a single algorithm (usually run-length encoding).

FTP login utilizes a normal usernames and password scheme for granting access. The username is sent to the server using the USER command, and the password is sent using the PASS command. If the information provided by the client is accepted by the server, the server will send a greeting to the client and the session will commence. If the server supports it, users may log in without providing login credentials, but the server may authorize only limited access for such sessions.

A host that provides an FTP service may provide anonymous FTP access.Users typically log into the service with an 'anonymous' (lower-case and case-sensitive in some FTP servers) account when prompted for user name. Although users are commonly asked to send their email address in lieu of a password,[ no verification is actually performed on the supplied data. Many FTP hosts whose purpose is to provide software updates will provide anonymous logins.

FTP was not designed to be a secure protocol—especially by today's standards—and has many security weaknesses. In May 1999, the authors of RFC 2577 listed a vulnerability to the following problems:
Bounce attacks
Spoof attacks
Brute force attacks
Packet capture (sniffing)
Username protection
Port stealing

FTP is not able to encrypt its traffic; all transmissions are in clear text, and usernames, passwords, commands and data can be easily read by anyone able to perform packet capture (sniffing) on the network.This problem is common to many of the Internet Protocol specifications (such as SMTP, Telnet, POP and IMAP) that were designed prior to the creation of encryption mechanisms such as TLS or SSL. A common solution to this problem is to use the "secure", TLS-protected versions of the insecure protocols (e.g. FTPS for FTP, TelnetS for Telnet, etc.) or a different, more secure protocol that can handle the job, such as the SFTP/SCP tools included with most implementations of the Secure Shell protocol.

Similar Documents

Free Essay

Aaaaaaa

...xxxxxxxxx xxxxxxx xxxxxx xxxxxxx xxxxxxxx xxxxxxx xxxxx xxxxxxxx xxxxxxxx xxxxxxxxx xxxxxxx xxxxxxxxxxxx xxxxxxxxxxxxxx xxxxxxxxxxx xxxxxxxxxxx xxxxxxxxx xxxxxxxxxx xxxxxxxxx xxxxxxxxx xxxxxxxxxxxx xxxxxxxxxx xxxxx xxxxxx Xxxxx xxxxxxxxx xxxxxxxxx xxxxxxx xxxxxx xxxxxxx xxxxxxxx xxxxxxx xxxxx xxxxxxxx xxxxxxxx xxxxxxxxx xxxxxxx xxxxxxxxxxxx xxxxxxxxxxxxxx xxxxxxxxxxx xxxxxxxxxxx xxxxxxxxx xxxxxxxxxx xxxxxxxxx xxxxxxxxx xxxxxxxxxxxx xxxxxxxxxx xxxxx xxxxxx Xxxxx xxxxxxxxx xxxxxxxxx xxxxxxx xxxxxx xxxxxxx xxxxxxxx xxxxxxx xxxxx xxxxxxxx xxxxxxxx xxxxxxxxx xxxxxxx xxxxxxxxxxxx xxxxxxxxxxxxxx xxxxxxxxxxx xxxxxxxxxxx xxxxxxxxx xxxxxxxxxx xxxxxxxxx xxxxxxxxx xxxxxxxxxxxx xxxxxxxxxx xxxxx xxxxxx Xxxxx xxxxxxxxx xxxxxxxxx xxxxxxx xxxxxx xxxxxxx xxxxxxxx xxxxxxx xxxxx xxxxxxxx xxxxxxxx xxxxxxxxx xxxxxxx xxxxxxxxxxxx xxxxxxxxxxxxxx xxxxxxxxxxx xxxxxxxxxxx xxxxxxxxx xxxxxxxxxx xxxxxxxxx xxxxxxxxx xxxxxxxxxxxx xxxxxxxxxx xxxxx xxxxxx Xxxxx xxxxxxxxx xxxxxxxxx xxxxxxx xxxxxx xxxxxxx xxxxxxxx xxxxxxx xxxxx xxxxxxxx xxxxxxxx xxxxxxxxx xxxxxxx xxxxxxxxxxxx xxxxxxxxxxxxxx xxxxxxxxxxx xxxxxxxxxxx xxxxxxxxx xxxxxxxxxx xxxxxxxxx xxxxxxxxx xxxxxxxxxxxx xxxxxxxxxx xxxxx xxxxxx Xxxxx xxxxxxxxx xxxxxxxxx xxxxxxx xxxxxx xxxxxxx xxxxxxxx xxxxxxx xxxxx xxxxxxxx xxxxxxxx xxxxxxxxx xxxxxxx xxxxxxxxxxxx xxxxxxxxxxxxxx xxxxxxxxxxx xxxxxxxxxxx xxxxxxxxx xxxxxxxxxx xxxxxxxxx xxxxxxxxx xxxxxxxxxxxx xxxxxxxxxx...

Words: 276 - Pages: 2

Free Essay

Thirteen Movie Case Study

...Abstract In this paper, Melanie will be discussed from a family psychologist’s perspective. Information about Melanie has been gathered through watching the film, Thirteen, and by observing her environment as well as her interactions with her daughter, Tracy, who has been introduced to the world of risky teenage behavior. Melanie is XXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX. Melanie: A Case Study As a counselor for families dealing with troubled adolescents, I have observed the cycle of decline that some teenagers drag their families into when they become involved in the wrong type of behavior. Because of this experience, I was eager to intervene in the case of Tracy when her mother, Melanie, came to me seeking help. Presenting Issue and Observations Melanie is a struggling single mother dealing with a thirteen-year-old daughter, Tracy, who is quickly and steadily becoming a teenager that Melanie does not even recognize. Melanie has explained that Tracy has become caught up in XXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX. Background: Family and Friends Melanie is a single-parent who lives in the lower socioeconomic status, just barely making ends meet as she cares for her son and daughter. Tracy...

Words: 351 - Pages: 2

Free Essay

Chapter 1

...THE RULE TO MAKE CHAPTER 1 ( ONE ) AT SOFTWARE ENGINEERING’S PROJECT CHAPTER I INTRODUCTION 1.1 The Reason for Choosing the Title The fast growth of computer nowadays are very helping human to make their work easier and faster in all aspect of life. To sending data between two separated places by geographic can be done in the moment and processing a huge data is only being done in quite short time. XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXX 1 2 1.2 Problem Formulation 1. 2. 3. 4. 5. According to the background in choosing title above, then the problem in this final assignment are: How is scaling process implemented on the image so we can get zooming on output image ? If zooming is done on the beginning image, it will affect many places (pixel) have spacey so image will not be looked fine. XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXX 3 1.3 The Objective of Research The Main purpose from this final assignment is to programming a software to recover quality of zooming image result...

Words: 776 - Pages: 4

Premium Essay

Steps to Negotiation Techniques

...1 Is Contract Management a Career for Me? xxxxxxxxxxxxxx Professor xxxxxxxxxxx Contract and Purchasing Negotiation Techniques – BUS 340 November 26, 2010 2 Contract Management is defined as: the work of managing a contract for goods, services or works, which includes monitoring performance, commercial aspects, delivery, improvement, complaints and customer satisfaction. The Federal Acquisition Regulation includes a set of four performance objectives: (1) to satisfy the customer in terms of cost, quality, and timeliness of the delivered product or service, (2) to minimize administrative operating cost, (3) to conduct business with integrity, fairness, and openness, and (4) to fulfill public policy objectives. Incorporating these objectives and operating under the clear definition, is critical to a Contracting Officer or Specialist. Before I was in the contracting field, I was in logistics in the military. Some of my duties were as follows: Establishes and maintains stock records and other records; establishes and maintains automated and manual accounting records, posts receipts and turn-ins; reviews and verifies quantities received against shipping documents; prepares and maintains records on equipment usage, operation, maintenance, modification, and calibration; processed inventories, surveys, and warehousing documents; prepares...

Words: 729 - Pages: 3

Free Essay

Business Writing

...Broadworth General Hospital 121 Hospital Lane Branson, MO 71121 February 2, 2013 Jeremy Dittmer Employee Relations Specialist Wydade Consulting Services 703 Sherwood Heights Branson, MO 71121 Dear Mr. Dittmer, My name is xxx xxx and I am the Human Resources Administrative Assistant at Broadworth General Hospital. My supervisor, Miriam Hopkins, has charged me with organizing a two-hour training seminar covering sexual harassment and unlawful discrimination in the workplace, to be attended by the hospital's 20 office supervisors. I understand that you require a three month advance notice regarding any training Broadworth needs so that you can supply an appropriate trainer and any materials that may be required. With that in mind, we have selected Monday, July 8, 2013, from 10:00 a.m. to 12:00 p.m. as the date and time for our seminar. Please let me know if this date and time is doable for the seminar as soon as possible so that I can get out all necessary notifications. The seminar should cover a detailed overview explaining what sexual harassment and unlawful discrimination in the workplace is, it's legal definition and laws, discuss prevention, how to handle complaints and how to maintain a positive work environment. I have reading materials and a video that will be provided to the seminar trainer and will be more than happy to provide any additional material and/or resources requested by the trainer. If you provide me a list of those items I will get...

Words: 342 - Pages: 2

Premium Essay

Information Systems

...Types of Information Systems XACC 210 XXXXXXXXXXXXXX The type of information that we use in our accounting department is Yardi, and Microsoft Excel, and PowerPoint. Yardi Systems is the property management software leader for real estate clients worldwide. Yardi provides integrated property management software & investment management solutions for all real estate verticals allowing owners, managers, investors & other stakeholders access to information specific to their needs. Yardi is also used for our daily journal entries, payables, and receivables, and other accounting functions that we need to have interoffice transaction done between our other office in Philadelphia, Washington D.C.; New Castle, DE; Baltimore, MD; and Bordentown, NJ. The other information system that we use is Microsoft Excel we use it for all spreadsheets, using a grid of cells arranged in numbered rows and letter-named columns to organize data manipulations like arithmetic operations. It has a battery of supplied functions to answer statistical, engineering and financial needs. In addition, it can display data as line graphs, histograms and charts, and with a very limited three-dimensional graphical display. It allows sectioning of data to view its dependencies on various factors for different perspectives (using pivot tables and the scenario manager). It has a programming aspect, Visual Basic for Applications, allowing the us to employ a wide variety of numerical methods, for example...

Words: 325 - Pages: 2

Premium Essay

Organizational Behavior Terminology and Concepts

...Organizational Behavior Terminology and Concepts xxxxxxxxxxxxxx MGT307 November 21, 2011 xxxxxxxxxxxxxxx Organizational Behavior Terminology and Concepts Organizational behavior is simply studying the way individuals interact and behave in various organizations, then taking this knowledge and using it to better productivity within the organization. In order to better understand the benefit and purpose of organizational behavior it is important to understand some of the key concepts associated with it. This paper will take a look at a couple of these concepts and explain how organizational culture and communication relate to organizational behavior in the workplace. Organizational Culture Within an organization, members might find they share the same values and beliefs that influence their behavior within the workplace; this is referred to as organizational culture (Schermerhorn, 2008). With focused goals and values, a company is able to work towards a common goal more efficiently. There are three different types of organizational culture within an organization, Passive/Defensive, Constructive, and Aggressive/Defensive. Within a passive culture members tend to be more defensive in their actions and the culture as a whole is less effective for the business. However, with the Aggressive culture members tend to be more forceful when interacting with each other, causing again a less effective culture for the business as a whole. Ideally the most effective cultures...

Words: 540 - Pages: 3

Free Essay

Tour of the Brain

...A Tour of the Brain XXXXXXXXXXXXXX Rasmussen College Author Note This paper is being submitted on XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX General Psychology. A Tour of the Brain The brain is the control center of the human body. It is protected by the skull and is made up of three main parts, the cerebrum, the cerebellum and the Brainstem. The brain is the boss of the body, it runs the show and controls just about everything one does, even when one’s asleep. (Kidshealth, n.d.) During this brief tour guide of the brain, one will see how the brain fits into the Central Nervous System, how the main parts work together, and what would happen if one of those main parts were damaged. In humans, the nervous system is divided into the central nervous system (CNS), which consist of the brain and spinal cord, and the peripheral nervous system (PNS), which contains all the nerves that run everywhere in the body. The brain and the spinal cord serve as the main processing center for the entire nervous system, and control all the workings of the human body. They work together to let messages flow back and forth between the brain and the body. The biggest part of the brain is cerebrum. The cerebrum is the thinking part of the brain and it controls the voluntary muscles, the ones that move when you want them to. When one is thinking hard, trying to solve a math problem or trying to figure out a video game, one is using the cerebrum. (Kidshealth, n.d.) The cerebrum is made up two...

Words: 718 - Pages: 3

Premium Essay

Resume Forma

...Martha Villegas xxxx. Avenue “O” Chicago, IL 12345 Phone:366-99-9999 e-mail: xxxxxxxxxxxxxx@gmail Objective: Seeking a challenging position where I can learn, further advance my skills and utilize my knowledge to benefit both the company and myself. . Summary Qualifications: I am a highly motivated individual with exceptional organization and communication skills, bilingual in Spanish and English. The 19 years of progressive experience I have gained in the work industry have enabled me to develop a solid foundation. Experience: 2011-2012 Book Keeper Assistant, Cabrales Gil Services, Inc. East Chicago, IN Prepare, report and pay monthly, quarterly and annual Sales Tax, Federal and State Reports for businesses. Assist business owners with discrepancies and missing reports with the IRS and State Agencies. Register business with federal and state agencies to report and pay mandatory reports on line. Apply for new and renewal business licenses. Enter all financial statements and reconcile business transactions into Quickbooks. Process payroll. 2009-2010 Secretary, C & M Roofing and Construction, Inc. Bolingbrook, IL Coordinated and scheduled appointments for all salesmen. Prepared proposals & invoices. Requested and obtained work permits to comply with city regulations. Maintained and organized customers, employees and vendor information in system In charge of payables and receivables. Prepared annual financial reports. 2003-2009 Owner/Office...

Words: 563 - Pages: 3

Premium Essay

Memo Enviro Clean

...Terry Smith HRM/531 Human Capital Management XXXXXXXXXXXXXX, Jr., PhD MEMO MANAGERIAL BEHAVIOR INTER CLEAN Memo To: Supervisors From: Terry Smith CC: Rachel Wicked Date: 4/12/2010 Re: Managerial behavior Team as you aware of the merger that will take place very shortly with Enviro Tech. It is important that as leaders we handle this transition with professionalism, a positive attitude, and confidence. The way we conduct ourselves through the merger will set the tone for the rest of the work force. The merger will present many challenges, apprehension, uncertainty and in some workers fear. A few of the reasons you reached the level of becoming a supervisor/leader (they are synonymous) is because you have proven to be trusted in making the right choice in hard decisions, you conduct yourself as a professional, demonstrate excellent people skills, and is not afraid of hard work. I need for you all to continuing exhibiting the same work ethics during this exciting time. When your workers see that you are positive, upbeat, and productive they will have the same attitude. If you show signs of stress, negativity, and poor behavior. The employees will think that something is going wrong. They might start thinking the worst including that personnel cuts will occur. What we will end up with are unhappy people who will lead to decreased work productivity and chaos. We will continue to practice and uphold our social, moral, and legal responsibilities during the...

Words: 544 - Pages: 3

Free Essay

Team Chart Analysis

...Analysis of Team Charter Week three collaboration between team C members resulted in interesting similarities and difference between team members in reference to personality types, listening skills, and trust level. Post the self assessment offered by Prentice Hall through the University of Phoenix; each team member got a better understanding of his / her team member strength and weaknesses, knowing that based on the self assessment there are no such “right” answer and neither extreme better than the other. The personality different types for team C can be summarized as follows: 1. xxxxxxxxxxxxxx = ENFJ 2. zzzzzzzzzzzzzzzz = ENTJ 3. eeeeeeeeeee = ENTJ 4. rrrrrrrrrrrrrrrrrrrrrr = ENTJ “ENTJ = is outgoing, visionary, argumentative, have low tolerance for incompetence, and often seen as a natural leader. As far career the survey lists; possible career as a manager, management trainer, stockholder, lawyer, chemical engineer, or police officer. ENFJ = is charismatic, compassionate, and highly persuasive. Possible career as a TV producer, fundraiser, drama teacher, or health adviser”. How often that; it works to have 75% of team members personalities are similar; we have three members (xxxxxxxxxxxxxxxxxxxx) earned type ENTJ in the Prentice Hall Self-Assessment and one team member ) earned different type ENFJ. The mix is not equivalent to experience different personalities; however, having the same personalities is a challenging factor...

Words: 651 - Pages: 3

Premium Essay

Military Member Should Be Tried by the Civilian Authorities,

...Informational Privacy in the United States Navy I work for is the United States Navy, I am going to discuss a few things that I feel to be improper use of the rules we took an oath to protect and uphold. In order for me to bring full light of what I want to bring forth as my issue I must share with you the oath of enlistment that every military member must take when entering onto active duty. I, XXXXXXXXXXXXXX, do solemnly swear (or affirm) that I will support and defend the Constitution of the United States against all enemies, foreign and domestic; that I will bear true faith and allegiance to the same; and that I will obey the orders of the President of the United States and the orders of the officers appointed over me, according to Regulations and the Uniform Code of Military Justice. So help me God (DD form 1966/4) Therefore, we will support and defend the Constitution of the United States and are held to higher standards of the Regulations and the Uniform Code of Military Justice. The UCMJ established by Congress on 5 May 1950, and effective on 31 May 1951. The word Uniform in the title refers to the congressional intent to make military justice uniform or consistent among the armed services. Before 1950, offenses in each branch of the service were handled differently and punishments were given by the service as they saw fit (UCMJ 1951). For example if a member of the Navy is put in an Unauthorized Absences (UA) status, it was handled differently...

Words: 1015 - Pages: 5

Premium Essay

Managerial Decision

...Managers Decision to Hire Temporary or a New a Worker xxxxxxxxxxxxxx BUS 640 xxxxxxxxxxxxxxxxx June 6, 2011 Managers Decision to Hire Temporary or a New Worker The decision to hire temporary workers or a new worker to handle the increased demands for the company’s product can be a very hard decision for companies to make. In this paper I will discuss what takes place when making such an important decision to increase production and save the company money. This paper will include an executive summary, definition, factors or cost, measurement, analysis and summary. Executive Summary Should a company hire temporary workers or hire full-time workers to handle increase demand for the company’s product? Companies are constantly facing some of the most demanding situations due to challenging times of our economic society. No decision is an easy one to make however; these choices have to be made in order to maintain a steady flow of resources and incomes. The law of demand mentions the concepts which clearly clarify that quantity demanded increases when prices fall and quantity demanded decreases when prices rise to a degree. At some point in time, management has a desire of knowing what the maximum price should be to render a product or service. Qualitative forecast serves to make some of the viable predictions as to whether certain circumstances are economic suitable, such as price, quantity whether they will change. Quantitative forecasts serves as a predictor...

Words: 1343 - Pages: 6

Free Essay

4 Formats of Business Letter

...Eng 209/WI 4 Business Letter Formats Side by Side Comparison of Design Full Block Letterhead Block Letterhead date inside address salutation xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx complementary close signature block inside address salutation date xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx complementary close signature block Modified Block Letterhead date inside address salutation xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx complementary close signature block date AMS Simplified Letterhead inside address SUBJECT ALL CAPS xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx NAME AND TITLE Templates of the four formats are available online at http://emedia.leeward.hawaii.edu/hurley/default.htm. To use, substitute your words for the words in the template The format for each letter follows → Hurley Eng 209/WI Block Letter...

Words: 841 - Pages: 4

Premium Essay

Business Preparation for Communication Diversity

...Business Preparation for Communication Diversity XXXXXXXXXXXXXX CMC 260 February 10, 2013 XXXXXXXXXXXXXXX Business Preparation for Communication Diversity When it comes to conducting business with other countries and cultures it is important to research and gain knowledge and information that will allow you to understand the changes you may have to make in order to assure that it is one that is not only successful but positive as well. No matter which country our culture it may be it is important to understand several different areas and make sure to ask yourself the correct questions. Those areas are to understand universal systems, cultural values, language and thought, social etiquette, business customs, negotiation strategies, and culture shock. Please feel free to use this as a guideline when beginning your research to help get a quick and easy start, ensuring that the business outcome will be successful. Universal Systems: It is important to understand how each culture works when it comes to economic, political, and educational, marriage and family, and social hierarchies and interaction systems. Each country will differ from the other so it is very important to make sure you have a full understanding of the importance and the way these things are seen in the country you will be conducting business in. Here are a few questions you think about while doing your research.  What type of economic system do they fall under?  What is the determining...

Words: 1448 - Pages: 6