Professional Documents
Culture Documents
MIL Module 1 (Ien)
MIL Module 1 (Ien)
Editors:
Reviewers:
Illustrator:
Layout Artist:
Introduction
Vocabulary List
To have a better understanding of the lesson presented in this
module, you should be familiar with the following terms:
Communication Flow
Illustration of
transmitter – medium - receiver
One-way. The information emanates from the source and goes to the
receiver. And the information flow ends there.
Illustration of
transmitter – medium – receiver – response - cycle
Radio and tv stations can now be heard or see through the mobile
phones and personal computer units too courtesy of the world wide web.
Even station from the remotest place on Earth can be ‘tuned’ as long as
internet signal is available. Not to fail to mention that newspapers and the
likes too are now in the same bandwagon with the broadcast media.
1. Intent
Objectives of doing the communication vary from as simple as
letting someone know your current location to reminding your
parents for the next family vacation plans.
2. Receiver
The ability to get, use, understand, and respond if need be the
information sent in least possible time is the worry here.
3. Privacy
Sender’s and the receiver’s privacy must not be compromised at
the expense of communication at any time. Overlooked, will be a
great mistake on the part of the leaking party. Sending someone’s
pictures, screengrabs of conversation, recorded audio or video
clips, and the likes always pose intrusion to privacy concerns.
4. Security
The idea of losing material things of value, or bodily harm that can
be inflicted to both sender and receiver are the concern of security
in a communication. Ordinary images or clips during the exchange
of communication may pose nothing to just anybody but many
details can be derived from it by a con man. Having a Siberian
Huskies dog in a picture may mean the person is in a middle class
family, that the person can be exploited to pay ransom. Giving
details such as residence address or telephone number can be
used to manipulate against just anybody. Unscrupulous persons
may use it ranging from just a simple name dropping to terroristic
acts attribution and blackmail. Electronic details such as mobile
number, atm number, etc. can be exploited as many times as can
be.
5. Convenience
Least effort and time to send information to intended recipient. Or,
the adeptness in sending out the communication is the concern of
convenience.
6. Cost
Sending the information with the least possible expense on the part
of the source is one good reason why that medium is used for the
communication.
PRACTICE TASK 1
Objective: In this task, you should be able to…
1. Describe how communication is influenced by media and information
technologies
2. Perform communication
3. Choose the appropriate medium of communication
• https://Google.com/ Search
• https://www.indeed.com/career-advice/career-
development/types-of-communication
ANSWER KEY